xref: /freebsd/contrib/sendmail/src/deliver.c (revision 87569f75a91f298c52a71823c04d41cf53c88889)
1 /*
2  * Copyright (c) 1998-2005 Sendmail, Inc. and its suppliers.
3  *	All rights reserved.
4  * Copyright (c) 1983, 1995-1997 Eric P. Allman.  All rights reserved.
5  * Copyright (c) 1988, 1993
6  *	The Regents of the University of California.  All rights reserved.
7  *
8  * By using this file, you agree to the terms and conditions set
9  * forth in the LICENSE file which can be found at the top level of
10  * the sendmail distribution.
11  *
12  */
13 
14 #include <sendmail.h>
15 #include <sys/time.h>
16 
17 SM_RCSID("@(#)$Id: deliver.c,v 8.986 2005/03/05 02:28:50 ca Exp $")
18 
19 #if HASSETUSERCONTEXT
20 # include <login_cap.h>
21 #endif /* HASSETUSERCONTEXT */
22 
23 #if NETINET || NETINET6
24 # include <arpa/inet.h>
25 #endif /* NETINET || NETINET6 */
26 
27 #if STARTTLS || SASL
28 # include "sfsasl.h"
29 #endif /* STARTTLS || SASL */
30 
31 static int	deliver __P((ENVELOPE *, ADDRESS *));
32 static void	dup_queue_file __P((ENVELOPE *, ENVELOPE *, int));
33 static void	mailfiletimeout __P((int));
34 static void	endwaittimeout __P((int));
35 static int	parse_hostsignature __P((char *, char **, MAILER *));
36 static void	sendenvelope __P((ENVELOPE *, int));
37 extern MCI	*mci_new __P((SM_RPOOL_T *));
38 static int	coloncmp __P((const char *, const char *));
39 
40 #if STARTTLS
41 static int	starttls __P((MAILER *, MCI *, ENVELOPE *));
42 static int	endtlsclt __P((MCI *));
43 #endif /* STARTTLS */
44 # if STARTTLS || SASL
45 static bool	iscltflgset __P((ENVELOPE *, int));
46 # endif /* STARTTLS || SASL */
47 
48 /*
49 **  SENDALL -- actually send all the messages.
50 **
51 **	Parameters:
52 **		e -- the envelope to send.
53 **		mode -- the delivery mode to use.  If SM_DEFAULT, use
54 **			the current e->e_sendmode.
55 **
56 **	Returns:
57 **		none.
58 **
59 **	Side Effects:
60 **		Scans the send lists and sends everything it finds.
61 **		Delivers any appropriate error messages.
62 **		If we are running in a non-interactive mode, takes the
63 **			appropriate action.
64 */
65 
66 void
67 sendall(e, mode)
68 	ENVELOPE *e;
69 	int mode;
70 {
71 	register ADDRESS *q;
72 	char *owner;
73 	int otherowners;
74 	int save_errno;
75 	register ENVELOPE *ee;
76 	ENVELOPE *splitenv = NULL;
77 	int oldverbose = Verbose;
78 	bool somedeliveries = false, expensive = false;
79 	pid_t pid;
80 
81 	/*
82 	**  If this message is to be discarded, don't bother sending
83 	**  the message at all.
84 	*/
85 
86 	if (bitset(EF_DISCARD, e->e_flags))
87 	{
88 		if (tTd(13, 1))
89 			sm_dprintf("sendall: discarding id %s\n", e->e_id);
90 		e->e_flags |= EF_CLRQUEUE;
91 		if (LogLevel > 9)
92 			logundelrcpts(e, "discarded", 9, true);
93 		else if (LogLevel > 4)
94 			sm_syslog(LOG_INFO, e->e_id, "discarded");
95 		markstats(e, NULL, STATS_REJECT);
96 		return;
97 	}
98 
99 	/*
100 	**  If we have had global, fatal errors, don't bother sending
101 	**  the message at all if we are in SMTP mode.  Local errors
102 	**  (e.g., a single address failing) will still cause the other
103 	**  addresses to be sent.
104 	*/
105 
106 	if (bitset(EF_FATALERRS, e->e_flags) &&
107 	    (OpMode == MD_SMTP || OpMode == MD_DAEMON))
108 	{
109 		e->e_flags |= EF_CLRQUEUE;
110 		return;
111 	}
112 
113 	/* determine actual delivery mode */
114 	if (mode == SM_DEFAULT)
115 	{
116 		mode = e->e_sendmode;
117 		if (mode != SM_VERIFY && mode != SM_DEFER &&
118 		    shouldqueue(e->e_msgpriority, e->e_ctime))
119 			mode = SM_QUEUE;
120 	}
121 
122 	if (tTd(13, 1))
123 	{
124 		sm_dprintf("\n===== SENDALL: mode %c, id %s, e_from ",
125 			mode, e->e_id);
126 		printaddr(sm_debug_file(), &e->e_from, false);
127 		sm_dprintf("\te_flags = ");
128 		printenvflags(e);
129 		sm_dprintf("sendqueue:\n");
130 		printaddr(sm_debug_file(), e->e_sendqueue, true);
131 	}
132 
133 	/*
134 	**  Do any preprocessing necessary for the mode we are running.
135 	**	Check to make sure the hop count is reasonable.
136 	**	Delete sends to the sender in mailing lists.
137 	*/
138 
139 	CurEnv = e;
140 	if (tTd(62, 1))
141 		checkfds(NULL);
142 
143 	if (e->e_hopcount > MaxHopCount)
144 	{
145 		char *recip;
146 
147 		if (e->e_sendqueue != NULL &&
148 		    e->e_sendqueue->q_paddr != NULL)
149 			recip = e->e_sendqueue->q_paddr;
150 		else
151 			recip = "(nobody)";
152 
153 		errno = 0;
154 		queueup(e, WILL_BE_QUEUED(mode), false);
155 		e->e_flags |= EF_FATALERRS|EF_PM_NOTIFY|EF_CLRQUEUE;
156 		ExitStat = EX_UNAVAILABLE;
157 		syserr("554 5.4.6 Too many hops %d (%d max): from %s via %s, to %s",
158 		       e->e_hopcount, MaxHopCount, e->e_from.q_paddr,
159 		       RealHostName == NULL ? "localhost" : RealHostName,
160 		       recip);
161 		for (q = e->e_sendqueue; q != NULL; q = q->q_next)
162 		{
163 			if (QS_IS_DEAD(q->q_state))
164 				continue;
165 			q->q_state = QS_BADADDR;
166 			q->q_status = "5.4.6";
167 			q->q_rstatus = "554 5.4.6 Too many hops";
168 		}
169 		return;
170 	}
171 
172 	/*
173 	**  Do sender deletion.
174 	**
175 	**	If the sender should be queued up, skip this.
176 	**	This can happen if the name server is hosed when you
177 	**	are trying to send mail.  The result is that the sender
178 	**	is instantiated in the queue as a recipient.
179 	*/
180 
181 	if (!bitset(EF_METOO, e->e_flags) &&
182 	    !QS_IS_QUEUEUP(e->e_from.q_state))
183 	{
184 		if (tTd(13, 5))
185 		{
186 			sm_dprintf("sendall: QS_SENDER ");
187 			printaddr(sm_debug_file(), &e->e_from, false);
188 		}
189 		e->e_from.q_state = QS_SENDER;
190 		(void) recipient(&e->e_from, &e->e_sendqueue, 0, e);
191 	}
192 
193 	/*
194 	**  Handle alias owners.
195 	**
196 	**	We scan up the q_alias chain looking for owners.
197 	**	We discard owners that are the same as the return path.
198 	*/
199 
200 	for (q = e->e_sendqueue; q != NULL; q = q->q_next)
201 	{
202 		register struct address *a;
203 
204 		for (a = q; a != NULL && a->q_owner == NULL; a = a->q_alias)
205 			continue;
206 		if (a != NULL)
207 			q->q_owner = a->q_owner;
208 
209 		if (q->q_owner != NULL &&
210 		    !QS_IS_DEAD(q->q_state) &&
211 		    strcmp(q->q_owner, e->e_from.q_paddr) == 0)
212 			q->q_owner = NULL;
213 	}
214 
215 	if (tTd(13, 25))
216 	{
217 		sm_dprintf("\nAfter first owner pass, sendq =\n");
218 		printaddr(sm_debug_file(), e->e_sendqueue, true);
219 	}
220 
221 	owner = "";
222 	otherowners = 1;
223 	while (owner != NULL && otherowners > 0)
224 	{
225 		if (tTd(13, 28))
226 			sm_dprintf("owner = \"%s\", otherowners = %d\n",
227 				   owner, otherowners);
228 		owner = NULL;
229 		otherowners = bitset(EF_SENDRECEIPT, e->e_flags) ? 1 : 0;
230 
231 		for (q = e->e_sendqueue; q != NULL; q = q->q_next)
232 		{
233 			if (tTd(13, 30))
234 			{
235 				sm_dprintf("Checking ");
236 				printaddr(sm_debug_file(), q, false);
237 			}
238 			if (QS_IS_DEAD(q->q_state))
239 			{
240 				if (tTd(13, 30))
241 					sm_dprintf("    ... QS_IS_DEAD\n");
242 				continue;
243 			}
244 			if (tTd(13, 29) && !tTd(13, 30))
245 			{
246 				sm_dprintf("Checking ");
247 				printaddr(sm_debug_file(), q, false);
248 			}
249 
250 			if (q->q_owner != NULL)
251 			{
252 				if (owner == NULL)
253 				{
254 					if (tTd(13, 40))
255 						sm_dprintf("    ... First owner = \"%s\"\n",
256 							   q->q_owner);
257 					owner = q->q_owner;
258 				}
259 				else if (owner != q->q_owner)
260 				{
261 					if (strcmp(owner, q->q_owner) == 0)
262 					{
263 						if (tTd(13, 40))
264 							sm_dprintf("    ... Same owner = \"%s\"\n",
265 								   owner);
266 
267 						/* make future comparisons cheap */
268 						q->q_owner = owner;
269 					}
270 					else
271 					{
272 						if (tTd(13, 40))
273 							sm_dprintf("    ... Another owner \"%s\"\n",
274 								   q->q_owner);
275 						otherowners++;
276 					}
277 					owner = q->q_owner;
278 				}
279 				else if (tTd(13, 40))
280 					sm_dprintf("    ... Same owner = \"%s\"\n",
281 						   owner);
282 			}
283 			else
284 			{
285 				if (tTd(13, 40))
286 					sm_dprintf("    ... Null owner\n");
287 				otherowners++;
288 			}
289 
290 			if (QS_IS_BADADDR(q->q_state))
291 			{
292 				if (tTd(13, 30))
293 					sm_dprintf("    ... QS_IS_BADADDR\n");
294 				continue;
295 			}
296 
297 			if (QS_IS_QUEUEUP(q->q_state))
298 			{
299 				MAILER *m = q->q_mailer;
300 
301 				/*
302 				**  If we have temporary address failures
303 				**  (e.g., dns failure) and a fallback MX is
304 				**  set, send directly to the fallback MX host.
305 				*/
306 
307 				if (FallbackMX != NULL &&
308 				    !wordinclass(FallbackMX, 'w') &&
309 				    mode != SM_VERIFY &&
310 				    !bitnset(M_NOMX, m->m_flags) &&
311 				    strcmp(m->m_mailer, "[IPC]") == 0 &&
312 				    m->m_argv[0] != NULL &&
313 				    strcmp(m->m_argv[0], "TCP") == 0)
314 				{
315 					int len;
316 					char *p;
317 
318 					if (tTd(13, 30))
319 						sm_dprintf("    ... FallbackMX\n");
320 
321 					len = strlen(FallbackMX) + 1;
322 					p = sm_rpool_malloc_x(e->e_rpool, len);
323 					(void) sm_strlcpy(p, FallbackMX, len);
324 					q->q_state = QS_OK;
325 					q->q_host = p;
326 				}
327 				else
328 				{
329 					if (tTd(13, 30))
330 						sm_dprintf("    ... QS_IS_QUEUEUP\n");
331 					continue;
332 				}
333 			}
334 
335 			/*
336 			**  If this mailer is expensive, and if we don't
337 			**  want to make connections now, just mark these
338 			**  addresses and return.  This is useful if we
339 			**  want to batch connections to reduce load.  This
340 			**  will cause the messages to be queued up, and a
341 			**  daemon will come along to send the messages later.
342 			*/
343 
344 			if (NoConnect && !Verbose &&
345 			    bitnset(M_EXPENSIVE, q->q_mailer->m_flags))
346 			{
347 				if (tTd(13, 30))
348 					sm_dprintf("    ... expensive\n");
349 				q->q_state = QS_QUEUEUP;
350 				expensive = true;
351 			}
352 			else if (bitnset(M_HOLD, q->q_mailer->m_flags) &&
353 				 QueueLimitId == NULL &&
354 				 QueueLimitSender == NULL &&
355 				 QueueLimitRecipient == NULL)
356 			{
357 				if (tTd(13, 30))
358 					sm_dprintf("    ... hold\n");
359 				q->q_state = QS_QUEUEUP;
360 				expensive = true;
361 			}
362 			else if (QueueMode != QM_QUARANTINE &&
363 				 e->e_quarmsg != NULL)
364 			{
365 				if (tTd(13, 30))
366 					sm_dprintf("    ... quarantine: %s\n",
367 						   e->e_quarmsg);
368 				q->q_state = QS_QUEUEUP;
369 				expensive = true;
370 			}
371 			else
372 			{
373 				if (tTd(13, 30))
374 					sm_dprintf("    ... deliverable\n");
375 				somedeliveries = true;
376 			}
377 		}
378 
379 		if (owner != NULL && otherowners > 0)
380 		{
381 			/*
382 			**  Split this envelope into two.
383 			*/
384 
385 			ee = (ENVELOPE *) sm_rpool_malloc_x(e->e_rpool,
386 							    sizeof *ee);
387 			STRUCTCOPY(*e, *ee);
388 			ee->e_message = NULL;
389 			ee->e_id = NULL;
390 			assign_queueid(ee);
391 
392 			if (tTd(13, 1))
393 				sm_dprintf("sendall: split %s into %s, owner = \"%s\", otherowners = %d\n",
394 					   e->e_id, ee->e_id, owner,
395 					   otherowners);
396 
397 			ee->e_header = copyheader(e->e_header, ee->e_rpool);
398 			ee->e_sendqueue = copyqueue(e->e_sendqueue,
399 						    ee->e_rpool);
400 			ee->e_errorqueue = copyqueue(e->e_errorqueue,
401 						     ee->e_rpool);
402 			ee->e_flags = e->e_flags & ~(EF_INQUEUE|EF_CLRQUEUE|EF_FATALERRS|EF_SENDRECEIPT|EF_RET_PARAM);
403 			ee->e_flags |= EF_NORECEIPT;
404 			setsender(owner, ee, NULL, '\0', true);
405 			if (tTd(13, 5))
406 			{
407 				sm_dprintf("sendall(split): QS_SENDER ");
408 				printaddr(sm_debug_file(), &ee->e_from, false);
409 			}
410 			ee->e_from.q_state = QS_SENDER;
411 			ee->e_dfp = NULL;
412 			ee->e_lockfp = NULL;
413 			ee->e_xfp = NULL;
414 			ee->e_qgrp = e->e_qgrp;
415 			ee->e_qdir = e->e_qdir;
416 			ee->e_errormode = EM_MAIL;
417 			ee->e_sibling = splitenv;
418 			ee->e_statmsg = NULL;
419 			if (e->e_quarmsg != NULL)
420 				ee->e_quarmsg = sm_rpool_strdup_x(ee->e_rpool,
421 								  e->e_quarmsg);
422 			splitenv = ee;
423 
424 			for (q = e->e_sendqueue; q != NULL; q = q->q_next)
425 			{
426 				if (q->q_owner == owner)
427 				{
428 					q->q_state = QS_CLONED;
429 					if (tTd(13, 6))
430 						sm_dprintf("\t... stripping %s from original envelope\n",
431 							   q->q_paddr);
432 				}
433 			}
434 			for (q = ee->e_sendqueue; q != NULL; q = q->q_next)
435 			{
436 				if (q->q_owner != owner)
437 				{
438 					q->q_state = QS_CLONED;
439 					if (tTd(13, 6))
440 						sm_dprintf("\t... dropping %s from cloned envelope\n",
441 							   q->q_paddr);
442 				}
443 				else
444 				{
445 					/* clear DSN parameters */
446 					q->q_flags &= ~(QHASNOTIFY|Q_PINGFLAGS);
447 					q->q_flags |= DefaultNotify & ~QPINGONSUCCESS;
448 					if (tTd(13, 6))
449 						sm_dprintf("\t... moving %s to cloned envelope\n",
450 							   q->q_paddr);
451 				}
452 			}
453 
454 			if (mode != SM_VERIFY && bitset(EF_HAS_DF, e->e_flags))
455 				dup_queue_file(e, ee, DATAFL_LETTER);
456 
457 			/*
458 			**  Give the split envelope access to the parent
459 			**  transcript file for errors obtained while
460 			**  processing the recipients (done before the
461 			**  envelope splitting).
462 			*/
463 
464 			if (e->e_xfp != NULL)
465 				ee->e_xfp = sm_io_dup(e->e_xfp);
466 
467 			/* failed to dup e->e_xfp, start a new transcript */
468 			if (ee->e_xfp == NULL)
469 				openxscript(ee);
470 
471 			if (mode != SM_VERIFY && LogLevel > 4)
472 				sm_syslog(LOG_INFO, e->e_id,
473 					  "%s: clone: owner=%s",
474 					  ee->e_id, owner);
475 		}
476 	}
477 
478 	if (owner != NULL)
479 	{
480 		setsender(owner, e, NULL, '\0', true);
481 		if (tTd(13, 5))
482 		{
483 			sm_dprintf("sendall(owner): QS_SENDER ");
484 			printaddr(sm_debug_file(), &e->e_from, false);
485 		}
486 		e->e_from.q_state = QS_SENDER;
487 		e->e_errormode = EM_MAIL;
488 		e->e_flags |= EF_NORECEIPT;
489 		e->e_flags &= ~EF_FATALERRS;
490 	}
491 
492 	/* if nothing to be delivered, just queue up everything */
493 	if (!somedeliveries && !WILL_BE_QUEUED(mode) &&
494 	    mode != SM_VERIFY)
495 	{
496 		time_t now;
497 
498 		if (tTd(13, 29))
499 			sm_dprintf("No deliveries: auto-queuing\n");
500 		mode = SM_QUEUE;
501 		now = curtime();
502 
503 		/* treat this as a delivery in terms of counting tries */
504 		e->e_dtime = now;
505 		if (!expensive)
506 			e->e_ntries++;
507 		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
508 		{
509 			ee->e_dtime = now;
510 			if (!expensive)
511 				ee->e_ntries++;
512 		}
513 	}
514 
515 	if ((WILL_BE_QUEUED(mode) || mode == SM_FORK ||
516 	     (mode != SM_VERIFY &&
517 	      (SuperSafe == SAFE_REALLY ||
518 	       SuperSafe == SAFE_REALLY_POSTMILTER))) &&
519 	    (!bitset(EF_INQUEUE, e->e_flags) || splitenv != NULL))
520 	{
521 		bool msync;
522 
523 		/*
524 		**  Be sure everything is instantiated in the queue.
525 		**  Split envelopes first in case the machine crashes.
526 		**  If the original were done first, we may lose
527 		**  recipients.
528 		*/
529 
530 #if !HASFLOCK
531 		msync = false;
532 #else /* !HASFLOCK */
533 		msync = mode == SM_FORK;
534 #endif /* !HASFLOCK */
535 
536 		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
537 			queueup(ee, WILL_BE_QUEUED(mode), msync);
538 		queueup(e, WILL_BE_QUEUED(mode), msync);
539 	}
540 
541 	if (tTd(62, 10))
542 		checkfds("after envelope splitting");
543 
544 	/*
545 	**  If we belong in background, fork now.
546 	*/
547 
548 	if (tTd(13, 20))
549 	{
550 		sm_dprintf("sendall: final mode = %c\n", mode);
551 		if (tTd(13, 21))
552 		{
553 			sm_dprintf("\n================ Final Send Queue(s) =====================\n");
554 			sm_dprintf("\n  *** Envelope %s, e_from=%s ***\n",
555 				   e->e_id, e->e_from.q_paddr);
556 			printaddr(sm_debug_file(), e->e_sendqueue, true);
557 			for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
558 			{
559 				sm_dprintf("\n  *** Envelope %s, e_from=%s ***\n",
560 					   ee->e_id, ee->e_from.q_paddr);
561 				printaddr(sm_debug_file(), ee->e_sendqueue, true);
562 			}
563 			sm_dprintf("==========================================================\n\n");
564 		}
565 	}
566 	switch (mode)
567 	{
568 	  case SM_VERIFY:
569 		Verbose = 2;
570 		break;
571 
572 	  case SM_QUEUE:
573 	  case SM_DEFER:
574 #if HASFLOCK
575   queueonly:
576 #endif /* HASFLOCK */
577 		if (e->e_nrcpts > 0)
578 			e->e_flags |= EF_INQUEUE;
579 		dropenvelope(e, splitenv != NULL, true);
580 		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
581 		{
582 			if (ee->e_nrcpts > 0)
583 				ee->e_flags |= EF_INQUEUE;
584 			dropenvelope(ee, false, true);
585 		}
586 		return;
587 
588 	  case SM_FORK:
589 		if (e->e_xfp != NULL)
590 			(void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT);
591 
592 #if !HASFLOCK
593 		/*
594 		**  Since fcntl locking has the interesting semantic that
595 		**  the lock is owned by a process, not by an open file
596 		**  descriptor, we have to flush this to the queue, and
597 		**  then restart from scratch in the child.
598 		*/
599 
600 		{
601 			/* save id for future use */
602 			char *qid = e->e_id;
603 
604 			/* now drop the envelope in the parent */
605 			e->e_flags |= EF_INQUEUE;
606 			dropenvelope(e, splitenv != NULL, false);
607 
608 			/* arrange to reacquire lock after fork */
609 			e->e_id = qid;
610 		}
611 
612 		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
613 		{
614 			/* save id for future use */
615 			char *qid = ee->e_id;
616 
617 			/* drop envelope in parent */
618 			ee->e_flags |= EF_INQUEUE;
619 			dropenvelope(ee, false, false);
620 
621 			/* and save qid for reacquisition */
622 			ee->e_id = qid;
623 		}
624 
625 #endif /* !HASFLOCK */
626 
627 		/*
628 		**  Since the delivery may happen in a child and the parent
629 		**  does not wait, the parent may close the maps thereby
630 		**  removing any shared memory used by the map.  Therefore,
631 		**  close the maps now so the child will dynamically open
632 		**  them if necessary.
633 		*/
634 
635 		closemaps(false);
636 
637 		pid = fork();
638 		if (pid < 0)
639 		{
640 			syserr("deliver: fork 1");
641 #if HASFLOCK
642 			goto queueonly;
643 #else /* HASFLOCK */
644 			e->e_id = NULL;
645 			for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
646 				ee->e_id = NULL;
647 			return;
648 #endif /* HASFLOCK */
649 		}
650 		else if (pid > 0)
651 		{
652 #if HASFLOCK
653 			/* be sure we leave the temp files to our child */
654 			/* close any random open files in the envelope */
655 			closexscript(e);
656 			if (e->e_dfp != NULL)
657 				(void) sm_io_close(e->e_dfp, SM_TIME_DEFAULT);
658 			e->e_dfp = NULL;
659 			e->e_flags &= ~EF_HAS_DF;
660 
661 			/* can't call unlockqueue to avoid unlink of xfp */
662 			if (e->e_lockfp != NULL)
663 				(void) sm_io_close(e->e_lockfp, SM_TIME_DEFAULT);
664 			else
665 				syserr("%s: sendall: null lockfp", e->e_id);
666 			e->e_lockfp = NULL;
667 #endif /* HASFLOCK */
668 
669 			/* make sure the parent doesn't own the envelope */
670 			e->e_id = NULL;
671 
672 #if USE_DOUBLE_FORK
673 			/* catch intermediate zombie */
674 			(void) waitfor(pid);
675 #endif /* USE_DOUBLE_FORK */
676 			return;
677 		}
678 
679 		/* Reset global flags */
680 		RestartRequest = NULL;
681 		RestartWorkGroup = false;
682 		ShutdownRequest = NULL;
683 		PendingSignal = 0;
684 
685 		/*
686 		**  Initialize exception stack and default exception
687 		**  handler for child process.
688 		*/
689 
690 		sm_exc_newthread(fatal_error);
691 
692 		/*
693 		**  Since we have accepted responsbility for the message,
694 		**  change the SIGTERM handler.  intsig() (the old handler)
695 		**  would remove the envelope if this was a command line
696 		**  message submission.
697 		*/
698 
699 		(void) sm_signal(SIGTERM, SIG_DFL);
700 
701 #if USE_DOUBLE_FORK
702 		/* double fork to avoid zombies */
703 		pid = fork();
704 		if (pid > 0)
705 			exit(EX_OK);
706 		save_errno = errno;
707 #endif /* USE_DOUBLE_FORK */
708 
709 		CurrentPid = getpid();
710 
711 		/* be sure we are immune from the terminal */
712 		disconnect(2, e);
713 		clearstats();
714 
715 		/* prevent parent from waiting if there was an error */
716 		if (pid < 0)
717 		{
718 			errno = save_errno;
719 			syserr("deliver: fork 2");
720 #if HASFLOCK
721 			e->e_flags |= EF_INQUEUE;
722 #else /* HASFLOCK */
723 			e->e_id = NULL;
724 #endif /* HASFLOCK */
725 			finis(true, true, ExitStat);
726 		}
727 
728 		/* be sure to give error messages in child */
729 		QuickAbort = false;
730 
731 		/*
732 		**  Close any cached connections.
733 		**
734 		**	We don't send the QUIT protocol because the parent
735 		**	still knows about the connection.
736 		**
737 		**	This should only happen when delivering an error
738 		**	message.
739 		*/
740 
741 		mci_flush(false, NULL);
742 
743 #if HASFLOCK
744 		break;
745 #else /* HASFLOCK */
746 
747 		/*
748 		**  Now reacquire and run the various queue files.
749 		*/
750 
751 		for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
752 		{
753 			ENVELOPE *sibling = ee->e_sibling;
754 
755 			(void) dowork(ee->e_qgrp, ee->e_qdir, ee->e_id,
756 				      false, false, ee);
757 			ee->e_sibling = sibling;
758 		}
759 		(void) dowork(e->e_qgrp, e->e_qdir, e->e_id,
760 			      false, false, e);
761 		finis(true, true, ExitStat);
762 #endif /* HASFLOCK */
763 	}
764 
765 	sendenvelope(e, mode);
766 	dropenvelope(e, true, true);
767 	for (ee = splitenv; ee != NULL; ee = ee->e_sibling)
768 	{
769 		CurEnv = ee;
770 		if (mode != SM_VERIFY)
771 			openxscript(ee);
772 		sendenvelope(ee, mode);
773 		dropenvelope(ee, true, true);
774 	}
775 	CurEnv = e;
776 
777 	Verbose = oldverbose;
778 	if (mode == SM_FORK)
779 		finis(true, true, ExitStat);
780 }
781 
782 static void
783 sendenvelope(e, mode)
784 	register ENVELOPE *e;
785 	int mode;
786 {
787 	register ADDRESS *q;
788 	bool didany;
789 
790 	if (tTd(13, 10))
791 		sm_dprintf("sendenvelope(%s) e_flags=0x%lx\n",
792 			   e->e_id == NULL ? "[NOQUEUE]" : e->e_id,
793 			   e->e_flags);
794 	if (LogLevel > 80)
795 		sm_syslog(LOG_DEBUG, e->e_id,
796 			  "sendenvelope, flags=0x%lx",
797 			  e->e_flags);
798 
799 	/*
800 	**  If we have had global, fatal errors, don't bother sending
801 	**  the message at all if we are in SMTP mode.  Local errors
802 	**  (e.g., a single address failing) will still cause the other
803 	**  addresses to be sent.
804 	*/
805 
806 	if (bitset(EF_FATALERRS, e->e_flags) &&
807 	    (OpMode == MD_SMTP || OpMode == MD_DAEMON))
808 	{
809 		e->e_flags |= EF_CLRQUEUE;
810 		return;
811 	}
812 
813 	/*
814 	**  Don't attempt deliveries if we want to bounce now
815 	**  or if deliver-by time is exceeded.
816 	*/
817 
818 	if (!bitset(EF_RESPONSE, e->e_flags) &&
819 	    (TimeOuts.to_q_return[e->e_timeoutclass] == NOW ||
820 	     (IS_DLVR_RETURN(e) && e->e_deliver_by > 0 &&
821 	      curtime() > e->e_ctime + e->e_deliver_by)))
822 		return;
823 
824 	/*
825 	**  Run through the list and send everything.
826 	**
827 	**	Set EF_GLOBALERRS so that error messages during delivery
828 	**	result in returned mail.
829 	*/
830 
831 	e->e_nsent = 0;
832 	e->e_flags |= EF_GLOBALERRS;
833 
834 	macdefine(&e->e_macro, A_PERM, macid("{envid}"), e->e_envid);
835 	macdefine(&e->e_macro, A_PERM, macid("{bodytype}"), e->e_bodytype);
836 	didany = false;
837 
838 	if (!bitset(EF_SPLIT, e->e_flags))
839 	{
840 		ENVELOPE *oldsib;
841 		ENVELOPE *ee;
842 
843 		/*
844 		**  Save old sibling and set it to NULL to avoid
845 		**  queueing up the same envelopes again.
846 		**  This requires that envelopes in that list have
847 		**  been take care of before (or at some other place).
848 		*/
849 
850 		oldsib = e->e_sibling;
851 		e->e_sibling = NULL;
852 		if (!split_by_recipient(e) &&
853 		    bitset(EF_FATALERRS, e->e_flags))
854 		{
855 			if (OpMode == MD_SMTP || OpMode == MD_DAEMON)
856 				e->e_flags |= EF_CLRQUEUE;
857 			return;
858 		}
859 		for (ee = e->e_sibling; ee != NULL; ee = ee->e_sibling)
860 			queueup(ee, false, true);
861 
862 		/* clean up */
863 		for (ee = e->e_sibling; ee != NULL; ee = ee->e_sibling)
864 		{
865 			/* now unlock the job */
866 			closexscript(ee);
867 			unlockqueue(ee);
868 
869 			/* this envelope is marked unused */
870 			if (ee->e_dfp != NULL)
871 			{
872 				(void) sm_io_close(ee->e_dfp, SM_TIME_DEFAULT);
873 				ee->e_dfp = NULL;
874 			}
875 			ee->e_id = NULL;
876 			ee->e_flags &= ~EF_HAS_DF;
877 		}
878 		e->e_sibling = oldsib;
879 	}
880 
881 	/* now run through the queue */
882 	for (q = e->e_sendqueue; q != NULL; q = q->q_next)
883 	{
884 #if XDEBUG
885 		char wbuf[MAXNAME + 20];
886 
887 		(void) sm_snprintf(wbuf, sizeof wbuf, "sendall(%.*s)",
888 				   MAXNAME, q->q_paddr);
889 		checkfd012(wbuf);
890 #endif /* XDEBUG */
891 		if (mode == SM_VERIFY)
892 		{
893 			e->e_to = q->q_paddr;
894 			if (QS_IS_SENDABLE(q->q_state))
895 			{
896 				if (q->q_host != NULL && q->q_host[0] != '\0')
897 					message("deliverable: mailer %s, host %s, user %s",
898 						q->q_mailer->m_name,
899 						q->q_host,
900 						q->q_user);
901 				else
902 					message("deliverable: mailer %s, user %s",
903 						q->q_mailer->m_name,
904 						q->q_user);
905 			}
906 		}
907 		else if (QS_IS_OK(q->q_state))
908 		{
909 			/*
910 			**  Checkpoint the send list every few addresses
911 			*/
912 
913 			if (CheckpointInterval > 0 &&
914 			    e->e_nsent >= CheckpointInterval)
915 			{
916 				queueup(e, false, false);
917 				e->e_nsent = 0;
918 			}
919 			(void) deliver(e, q);
920 			didany = true;
921 		}
922 	}
923 	if (didany)
924 	{
925 		e->e_dtime = curtime();
926 		e->e_ntries++;
927 	}
928 
929 #if XDEBUG
930 	checkfd012("end of sendenvelope");
931 #endif /* XDEBUG */
932 }
933 
934 #if REQUIRES_DIR_FSYNC
935 /*
936 **  SYNC_DIR -- fsync a directory based on a filename
937 **
938 **	Parameters:
939 **		filename -- path of file
940 **		panic -- panic?
941 **
942 **	Returns:
943 **		none
944 */
945 
946 void
947 sync_dir(filename, panic)
948 	char *filename;
949 	bool panic;
950 {
951 	int dirfd;
952 	char *dirp;
953 	char dir[MAXPATHLEN];
954 
955 	if (!RequiresDirfsync)
956 		return;
957 
958 	/* filesystems which require the directory be synced */
959 	dirp = strrchr(filename, '/');
960 	if (dirp != NULL)
961 	{
962 		if (sm_strlcpy(dir, filename, sizeof dir) >= sizeof dir)
963 			return;
964 		dir[dirp - filename] = '\0';
965 		dirp = dir;
966 	}
967 	else
968 		dirp = ".";
969 	dirfd = open(dirp, O_RDONLY, 0700);
970 	if (tTd(40,32))
971 		sm_syslog(LOG_INFO, NOQID, "sync_dir: %s: fsync(%d)",
972 			  dirp, dirfd);
973 	if (dirfd >= 0)
974 	{
975 		if (fsync(dirfd) < 0)
976 		{
977 			if (panic)
978 				syserr("!sync_dir: cannot fsync directory %s",
979 				       dirp);
980 			else if (LogLevel > 1)
981 				sm_syslog(LOG_ERR, NOQID,
982 					  "sync_dir: cannot fsync directory %s: %s",
983 					  dirp, sm_errstring(errno));
984 		}
985 		(void) close(dirfd);
986 	}
987 }
988 #endif /* REQUIRES_DIR_FSYNC */
989 /*
990 **  DUP_QUEUE_FILE -- duplicate a queue file into a split queue
991 **
992 **	Parameters:
993 **		e -- the existing envelope
994 **		ee -- the new envelope
995 **		type -- the queue file type (e.g., DATAFL_LETTER)
996 **
997 **	Returns:
998 **		none
999 */
1000 
1001 static void
1002 dup_queue_file(e, ee, type)
1003 	ENVELOPE *e, *ee;
1004 	int type;
1005 {
1006 	char f1buf[MAXPATHLEN], f2buf[MAXPATHLEN];
1007 
1008 	ee->e_dfp = NULL;
1009 	ee->e_xfp = NULL;
1010 
1011 	/*
1012 	**  Make sure both are in the same directory.
1013 	*/
1014 
1015 	(void) sm_strlcpy(f1buf, queuename(e, type), sizeof f1buf);
1016 	(void) sm_strlcpy(f2buf, queuename(ee, type), sizeof f2buf);
1017 
1018 	/* Force the df to disk if it's not there yet */
1019 	if (type == DATAFL_LETTER && e->e_dfp != NULL &&
1020 	    sm_io_setinfo(e->e_dfp, SM_BF_COMMIT, NULL) < 0 &&
1021 	    errno != EINVAL)
1022 	{
1023 		syserr("!dup_queue_file: can't commit %s", f1buf);
1024 		/* NOTREACHED */
1025 	}
1026 
1027 	if (link(f1buf, f2buf) < 0)
1028 	{
1029 		int save_errno = errno;
1030 
1031 		syserr("sendall: link(%s, %s)", f1buf, f2buf);
1032 		if (save_errno == EEXIST)
1033 		{
1034 			if (unlink(f2buf) < 0)
1035 			{
1036 				syserr("!sendall: unlink(%s): permanent",
1037 				       f2buf);
1038 				/* NOTREACHED */
1039 			}
1040 			if (link(f1buf, f2buf) < 0)
1041 			{
1042 				syserr("!sendall: link(%s, %s): permanent",
1043 				       f1buf, f2buf);
1044 				/* NOTREACHED */
1045 			}
1046 		}
1047 	}
1048 	SYNC_DIR(f2buf, true);
1049 }
1050 /*
1051 **  DOFORK -- do a fork, retrying a couple of times on failure.
1052 **
1053 **	This MUST be a macro, since after a vfork we are running
1054 **	two processes on the same stack!!!
1055 **
1056 **	Parameters:
1057 **		none.
1058 **
1059 **	Returns:
1060 **		From a macro???  You've got to be kidding!
1061 **
1062 **	Side Effects:
1063 **		Modifies the ==> LOCAL <== variable 'pid', leaving:
1064 **			pid of child in parent, zero in child.
1065 **			-1 on unrecoverable error.
1066 **
1067 **	Notes:
1068 **		I'm awfully sorry this looks so awful.  That's
1069 **		vfork for you.....
1070 */
1071 
1072 #define NFORKTRIES	5
1073 
1074 #ifndef FORK
1075 # define FORK	fork
1076 #endif /* ! FORK */
1077 
1078 #define DOFORK(fORKfN) \
1079 {\
1080 	register int i;\
1081 \
1082 	for (i = NFORKTRIES; --i >= 0; )\
1083 	{\
1084 		pid = fORKfN();\
1085 		if (pid >= 0)\
1086 			break;\
1087 		if (i > 0)\
1088 			(void) sleep((unsigned) NFORKTRIES - i);\
1089 	}\
1090 }
1091 /*
1092 **  DOFORK -- simple fork interface to DOFORK.
1093 **
1094 **	Parameters:
1095 **		none.
1096 **
1097 **	Returns:
1098 **		pid of child in parent.
1099 **		zero in child.
1100 **		-1 on error.
1101 **
1102 **	Side Effects:
1103 **		returns twice, once in parent and once in child.
1104 */
1105 
1106 pid_t
1107 dofork()
1108 {
1109 	register pid_t pid = -1;
1110 
1111 	DOFORK(fork);
1112 	return pid;
1113 }
1114 
1115 /*
1116 **  COLONCMP -- compare host-signatures up to first ':' or EOS
1117 **
1118 **	This takes two strings which happen to be host-signatures and
1119 **	compares them. If the lowest preference portions of the MX-RR's
1120 **	match (up to ':' or EOS, whichever is first), then we have
1121 **	match. This is used for coattail-piggybacking messages during
1122 **	message delivery.
1123 **	If the signatures are the same up to the first ':' the remainder of
1124 **	the signatures are then compared with a normal strcmp(). This saves
1125 **	re-examining the first part of the signatures.
1126 **
1127 **	Parameters:
1128 **		a - first host-signature
1129 **		b - second host-signature
1130 **
1131 **	Returns:
1132 **		HS_MATCH_NO -- no "match".
1133 **		HS_MATCH_FIRST -- "match" for the first MX preference
1134 **			(up to the first colon (':')).
1135 **		HS_MATCH_FULL -- match for the entire MX record.
1136 **
1137 **	Side Effects:
1138 **		none.
1139 */
1140 
1141 #define HS_MATCH_NO	0
1142 #define HS_MATCH_FIRST	1
1143 #define HS_MATCH_FULL	2
1144 
1145 static int
1146 coloncmp(a, b)
1147 	register const char *a;
1148 	register const char *b;
1149 {
1150 	int ret = HS_MATCH_NO;
1151 	int braclev = 0;
1152 
1153 	while (*a == *b++)
1154 	{
1155 		/* Need to account for IPv6 bracketed addresses */
1156 		if (*a == '[')
1157 			braclev++;
1158 		else if (*a == ']' && braclev > 0)
1159 			braclev--;
1160 		else if (*a == ':' && braclev <= 0)
1161 		{
1162 			ret = HS_MATCH_FIRST;
1163 			a++;
1164 			break;
1165 		}
1166 		else if (*a == '\0')
1167 			return HS_MATCH_FULL; /* a full match */
1168 		a++;
1169 	}
1170 	if (ret == HS_MATCH_NO &&
1171 	    braclev <= 0 &&
1172 	    ((*a == '\0' && *(b - 1) == ':') ||
1173 	     (*a == ':' && *(b - 1) == '\0')))
1174 		return HS_MATCH_FIRST;
1175 	if (ret == HS_MATCH_FIRST && strcmp(a, b) == 0)
1176 		return HS_MATCH_FULL;
1177 
1178 	return ret;
1179 }
1180 
1181 /*
1182 **  SHOULD_TRY_FBSH -- Should try FallbackSmartHost?
1183 **
1184 **	Parameters:
1185 **		e -- envelope
1186 **		tried_fallbacksmarthost -- has been tried already? (in/out)
1187 **		hostbuf -- buffer for hostname (expand FallbackSmartHost) (out)
1188 **		hbsz -- size of hostbuf
1189 **		status -- current delivery status
1190 **
1191 **	Returns:
1192 **		true iff FallbackSmartHost should be tried.
1193 */
1194 
1195 static bool
1196 should_try_fbsh(e, tried_fallbacksmarthost, hostbuf, hbsz, status)
1197 	ENVELOPE *e;
1198 	bool *tried_fallbacksmarthost;
1199 	char *hostbuf;
1200 	size_t hbsz;
1201 	int status;
1202 {
1203 	/*
1204 	**  If the host was not found and a FallbackSmartHost is defined
1205 	**  (and we have not yet tried it), then make one last try with
1206 	**  it as the host.
1207 	*/
1208 
1209 	if (status == EX_NOHOST && FallbackSmartHost != NULL &&
1210 	    !*tried_fallbacksmarthost)
1211 	{
1212 		*tried_fallbacksmarthost = true;
1213 		expand(FallbackSmartHost, hostbuf, hbsz, e);
1214 		if (!wordinclass(hostbuf, 'w'))
1215 		{
1216 			if (tTd(11, 1))
1217 				sm_dprintf("one last try with FallbackSmartHost %s\n",
1218 					   hostbuf);
1219 			return true;
1220 		}
1221 	}
1222 	return false;
1223 }
1224 /*
1225 **  DELIVER -- Deliver a message to a list of addresses.
1226 **
1227 **	This routine delivers to everyone on the same host as the
1228 **	user on the head of the list.  It is clever about mailers
1229 **	that don't handle multiple users.  It is NOT guaranteed
1230 **	that it will deliver to all these addresses however -- so
1231 **	deliver should be called once for each address on the
1232 **	list.
1233 **	Deliver tries to be as opportunistic as possible about piggybacking
1234 **	messages. Some definitions to make understanding easier follow below.
1235 **	Piggybacking occurs when an existing connection to a mail host can
1236 **	be used to send the same message to more than one recipient at the
1237 **	same time. So "no piggybacking" means one message for one recipient
1238 **	per connection. "Intentional piggybacking" happens when the
1239 **	recipients' host address (not the mail host address) is used to
1240 **	attempt piggybacking. Recipients with the same host address
1241 **	have the same mail host. "Coincidental piggybacking" relies on
1242 **	piggybacking based on all the mail host addresses in the MX-RR. This
1243 **	is "coincidental" in the fact it could not be predicted until the
1244 **	MX Resource Records for the hosts were obtained and examined. For
1245 **	example (preference order and equivalence is important, not values):
1246 **		domain1 IN MX 10 mxhost-A
1247 **			IN MX 20 mxhost-B
1248 **		domain2 IN MX  4 mxhost-A
1249 **			IN MX  8 mxhost-B
1250 **	Domain1 and domain2 can piggyback the same message to mxhost-A or
1251 **	mxhost-B (if mxhost-A cannot be reached).
1252 **	"Coattail piggybacking" relaxes the strictness of "coincidental
1253 **	piggybacking" in the hope that most significant (lowest value)
1254 **	MX preference host(s) can create more piggybacking. For example
1255 **	(again, preference order and equivalence is important, not values):
1256 **		domain3 IN MX 100 mxhost-C
1257 **			IN MX 100 mxhost-D
1258 **			IN MX 200 mxhost-E
1259 **		domain4 IN MX  50 mxhost-C
1260 **			IN MX  50 mxhost-D
1261 **			IN MX  80 mxhost-F
1262 **	A message for domain3 and domain4 can piggyback to mxhost-C if mxhost-C
1263 **	is available. Same with mxhost-D because in both RR's the preference
1264 **	value is the same as mxhost-C, respectively.
1265 **	So deliver attempts coattail piggybacking when possible. If the
1266 **	first MX preference level hosts cannot be used then the piggybacking
1267 **	reverts to coincidental piggybacking. Using the above example you
1268 **	cannot deliver to mxhost-F for domain3 regardless of preference value.
1269 **	("Coattail" from "riding on the coattails of your predecessor" meaning
1270 **	gaining benefit from a predecessor effort with no or little addition
1271 **	effort. The predecessor here being the preceding MX RR).
1272 **
1273 **	Parameters:
1274 **		e -- the envelope to deliver.
1275 **		firstto -- head of the address list to deliver to.
1276 **
1277 **	Returns:
1278 **		zero -- successfully delivered.
1279 **		else -- some failure, see ExitStat for more info.
1280 **
1281 **	Side Effects:
1282 **		The standard input is passed off to someone.
1283 */
1284 
1285 static int
1286 deliver(e, firstto)
1287 	register ENVELOPE *e;
1288 	ADDRESS *firstto;
1289 {
1290 	char *host;			/* host being sent to */
1291 	char *user;			/* user being sent to */
1292 	char **pvp;
1293 	register char **mvp;
1294 	register char *p;
1295 	register MAILER *m;		/* mailer for this recipient */
1296 	ADDRESS *volatile ctladdr;
1297 #if HASSETUSERCONTEXT
1298 	ADDRESS *volatile contextaddr = NULL;
1299 #endif /* HASSETUSERCONTEXT */
1300 	register MCI *volatile mci;
1301 	register ADDRESS *SM_NONVOLATILE to = firstto;
1302 	volatile bool clever = false;	/* running user smtp to this mailer */
1303 	ADDRESS *volatile tochain = NULL; /* users chain in this mailer call */
1304 	int rcode;			/* response code */
1305 	SM_NONVOLATILE int lmtp_rcode = EX_OK;
1306 	SM_NONVOLATILE int nummxhosts = 0; /* number of MX hosts available */
1307 	SM_NONVOLATILE int hostnum = 0;	/* current MX host index */
1308 	char *firstsig;			/* signature of firstto */
1309 	volatile pid_t pid = -1;
1310 	char *volatile curhost;
1311 	SM_NONVOLATILE unsigned short port = 0;
1312 	SM_NONVOLATILE time_t enough = 0;
1313 #if NETUNIX
1314 	char *SM_NONVOLATILE mux_path = NULL;	/* path to UNIX domain socket */
1315 #endif /* NETUNIX */
1316 	time_t xstart;
1317 	bool suidwarn;
1318 	bool anyok;			/* at least one address was OK */
1319 	SM_NONVOLATILE bool goodmxfound = false; /* at least one MX was OK */
1320 	bool ovr;
1321 	bool quarantine;
1322 	int strsize;
1323 	int rcptcount;
1324 	int ret;
1325 	static int tobufsize = 0;
1326 	static char *tobuf = NULL;
1327 	char *rpath;	/* translated return path */
1328 	int mpvect[2];
1329 	int rpvect[2];
1330 	char *mxhosts[MAXMXHOSTS + 1];
1331 	char *pv[MAXPV + 1];
1332 	char buf[MAXNAME + 1];
1333 	char cbuf[MAXPATHLEN];
1334 
1335 	errno = 0;
1336 	if (!QS_IS_OK(to->q_state))
1337 		return 0;
1338 
1339 	suidwarn = geteuid() == 0;
1340 
1341 	m = to->q_mailer;
1342 	host = to->q_host;
1343 	CurEnv = e;			/* just in case */
1344 	e->e_statmsg = NULL;
1345 	SmtpError[0] = '\0';
1346 	xstart = curtime();
1347 
1348 	if (tTd(10, 1))
1349 		sm_dprintf("\n--deliver, id=%s, mailer=%s, host=`%s', first user=`%s'\n",
1350 			e->e_id, m->m_name, host, to->q_user);
1351 	if (tTd(10, 100))
1352 		printopenfds(false);
1353 
1354 	/*
1355 	**  Clear {client_*} macros if this is a bounce message to
1356 	**  prevent rejection by check_compat ruleset.
1357 	*/
1358 
1359 	if (bitset(EF_RESPONSE, e->e_flags))
1360 	{
1361 		macdefine(&e->e_macro, A_PERM, macid("{client_name}"), "");
1362 		macdefine(&e->e_macro, A_PERM, macid("{client_ptr}"), "");
1363 		macdefine(&e->e_macro, A_PERM, macid("{client_addr}"), "");
1364 		macdefine(&e->e_macro, A_PERM, macid("{client_port}"), "");
1365 		macdefine(&e->e_macro, A_PERM, macid("{client_resolve}"), "");
1366 	}
1367 
1368 	SM_TRY
1369 	{
1370 	ADDRESS *skip_back = NULL;
1371 
1372 	/*
1373 	**  Do initial argv setup.
1374 	**	Insert the mailer name.  Notice that $x expansion is
1375 	**	NOT done on the mailer name.  Then, if the mailer has
1376 	**	a picky -f flag, we insert it as appropriate.  This
1377 	**	code does not check for 'pv' overflow; this places a
1378 	**	manifest lower limit of 4 for MAXPV.
1379 	**		The from address rewrite is expected to make
1380 	**		the address relative to the other end.
1381 	*/
1382 
1383 	/* rewrite from address, using rewriting rules */
1384 	rcode = EX_OK;
1385 	if (bitnset(M_UDBENVELOPE, e->e_from.q_mailer->m_flags))
1386 		p = e->e_sender;
1387 	else
1388 		p = e->e_from.q_paddr;
1389 	rpath = remotename(p, m, RF_SENDERADDR|RF_CANONICAL, &rcode, e);
1390 	if (strlen(rpath) > MAXSHORTSTR)
1391 	{
1392 		rpath = shortenstring(rpath, MAXSHORTSTR);
1393 
1394 		/* avoid bogus errno */
1395 		errno = 0;
1396 		syserr("remotename: huge return path %s", rpath);
1397 	}
1398 	rpath = sm_rpool_strdup_x(e->e_rpool, rpath);
1399 	macdefine(&e->e_macro, A_PERM, 'g', rpath);
1400 	macdefine(&e->e_macro, A_PERM, 'h', host);
1401 	Errors = 0;
1402 	pvp = pv;
1403 	*pvp++ = m->m_argv[0];
1404 
1405 	/* ignore long term host status information if mailer flag W is set */
1406 	if (bitnset(M_NOHOSTSTAT, m->m_flags))
1407 		IgnoreHostStatus = true;
1408 
1409 	/* insert -f or -r flag as appropriate */
1410 	if (FromFlag &&
1411 	    (bitnset(M_FOPT, m->m_flags) ||
1412 	     bitnset(M_ROPT, m->m_flags)))
1413 	{
1414 		if (bitnset(M_FOPT, m->m_flags))
1415 			*pvp++ = "-f";
1416 		else
1417 			*pvp++ = "-r";
1418 		*pvp++ = rpath;
1419 	}
1420 
1421 	/*
1422 	**  Append the other fixed parts of the argv.  These run
1423 	**  up to the first entry containing "$u".  There can only
1424 	**  be one of these, and there are only a few more slots
1425 	**  in the pv after it.
1426 	*/
1427 
1428 	for (mvp = m->m_argv; (p = *++mvp) != NULL; )
1429 	{
1430 		/* can't use strchr here because of sign extension problems */
1431 		while (*p != '\0')
1432 		{
1433 			if ((*p++ & 0377) == MACROEXPAND)
1434 			{
1435 				if (*p == 'u')
1436 					break;
1437 			}
1438 		}
1439 
1440 		if (*p != '\0')
1441 			break;
1442 
1443 		/* this entry is safe -- go ahead and process it */
1444 		expand(*mvp, buf, sizeof buf, e);
1445 		*pvp++ = sm_rpool_strdup_x(e->e_rpool, buf);
1446 		if (pvp >= &pv[MAXPV - 3])
1447 		{
1448 			syserr("554 5.3.5 Too many parameters to %s before $u",
1449 			       pv[0]);
1450 			rcode = -1;
1451 			goto cleanup;
1452 		}
1453 	}
1454 
1455 	/*
1456 	**  If we have no substitution for the user name in the argument
1457 	**  list, we know that we must supply the names otherwise -- and
1458 	**  SMTP is the answer!!
1459 	*/
1460 
1461 	if (*mvp == NULL)
1462 	{
1463 		/* running LMTP or SMTP */
1464 		clever = true;
1465 		*pvp = NULL;
1466 	}
1467 	else if (bitnset(M_LMTP, m->m_flags))
1468 	{
1469 		/* not running LMTP */
1470 		sm_syslog(LOG_ERR, NULL,
1471 			  "Warning: mailer %s: LMTP flag (F=z) turned off",
1472 			  m->m_name);
1473 		clrbitn(M_LMTP, m->m_flags);
1474 	}
1475 
1476 	/*
1477 	**  At this point *mvp points to the argument with $u.  We
1478 	**  run through our address list and append all the addresses
1479 	**  we can.  If we run out of space, do not fret!  We can
1480 	**  always send another copy later.
1481 	*/
1482 
1483 	e->e_to = NULL;
1484 	strsize = 2;
1485 	rcptcount = 0;
1486 	ctladdr = NULL;
1487 	if (firstto->q_signature == NULL)
1488 		firstto->q_signature = hostsignature(firstto->q_mailer,
1489 						     firstto->q_host);
1490 	firstsig = firstto->q_signature;
1491 
1492 	for (; to != NULL; to = to->q_next)
1493 	{
1494 		/* avoid sending multiple recipients to dumb mailers */
1495 		if (tochain != NULL && !bitnset(M_MUSER, m->m_flags))
1496 			break;
1497 
1498 		/* if already sent or not for this host, don't send */
1499 		if (!QS_IS_OK(to->q_state)) /* already sent; look at next */
1500 			continue;
1501 
1502 		/*
1503 		**  Must be same mailer to keep grouping rcpts.
1504 		**  If mailers don't match: continue; sendqueue is not
1505 		**  sorted by mailers, so don't break;
1506 		*/
1507 
1508 		if (to->q_mailer != firstto->q_mailer)
1509 			continue;
1510 
1511 		if (to->q_signature == NULL) /* for safety */
1512 			to->q_signature = hostsignature(to->q_mailer,
1513 							to->q_host);
1514 
1515 		/*
1516 		**  This is for coincidental and tailcoat piggybacking messages
1517 		**  to the same mail host. While the signatures are identical
1518 		**  (that's the MX-RR's are identical) we can do coincidental
1519 		**  piggybacking. We try hard for coattail piggybacking
1520 		**  with the same mail host when the next recipient has the
1521 		**  same host at lowest preference. It may be that this
1522 		**  won't work out, so 'skip_back' is maintained if a backup
1523 		**  to coincidental piggybacking or full signature must happen.
1524 		*/
1525 
1526 		ret = firstto == to ? HS_MATCH_FULL :
1527 				      coloncmp(to->q_signature, firstsig);
1528 		if (ret == HS_MATCH_FULL)
1529 			skip_back = to;
1530 		else if (ret == HS_MATCH_NO)
1531 			break;
1532 
1533 		if (!clever)
1534 		{
1535 			/* avoid overflowing tobuf */
1536 			strsize += strlen(to->q_paddr) + 1;
1537 			if (strsize > TOBUFSIZE)
1538 				break;
1539 		}
1540 
1541 		if (++rcptcount > to->q_mailer->m_maxrcpt)
1542 			break;
1543 
1544 		if (tTd(10, 1))
1545 		{
1546 			sm_dprintf("\nsend to ");
1547 			printaddr(sm_debug_file(), to, false);
1548 		}
1549 
1550 		/* compute effective uid/gid when sending */
1551 		if (bitnset(M_RUNASRCPT, to->q_mailer->m_flags))
1552 # if HASSETUSERCONTEXT
1553 			contextaddr = ctladdr = getctladdr(to);
1554 # else /* HASSETUSERCONTEXT */
1555 			ctladdr = getctladdr(to);
1556 # endif /* HASSETUSERCONTEXT */
1557 
1558 		if (tTd(10, 2))
1559 		{
1560 			sm_dprintf("ctladdr=");
1561 			printaddr(sm_debug_file(), ctladdr, false);
1562 		}
1563 
1564 		user = to->q_user;
1565 		e->e_to = to->q_paddr;
1566 
1567 		/*
1568 		**  Check to see that these people are allowed to
1569 		**  talk to each other.
1570 		**  Check also for overflow of e_msgsize.
1571 		*/
1572 
1573 		if (m->m_maxsize != 0 &&
1574 		    (e->e_msgsize > m->m_maxsize || e->e_msgsize < 0))
1575 		{
1576 			e->e_flags |= EF_NO_BODY_RETN;
1577 			if (bitnset(M_LOCALMAILER, to->q_mailer->m_flags))
1578 				to->q_status = "5.2.3";
1579 			else
1580 				to->q_status = "5.3.4";
1581 
1582 			/* set to->q_rstatus = NULL; or to the following? */
1583 			usrerrenh(to->q_status,
1584 				  "552 Message is too large; %ld bytes max",
1585 				  m->m_maxsize);
1586 			markfailure(e, to, NULL, EX_UNAVAILABLE, false);
1587 			giveresponse(EX_UNAVAILABLE, to->q_status, m,
1588 				     NULL, ctladdr, xstart, e, to);
1589 			continue;
1590 		}
1591 		SM_SET_H_ERRNO(0);
1592 		ovr = true;
1593 
1594 		/* do config file checking of compatibility */
1595 		quarantine = (e->e_quarmsg != NULL);
1596 		rcode = rscheck("check_compat", e->e_from.q_paddr, to->q_paddr,
1597 				e, RSF_RMCOMM|RSF_COUNT, 3, NULL,
1598 				e->e_id);
1599 		if (rcode == EX_OK)
1600 		{
1601 			/* do in-code checking if not discarding */
1602 			if (!bitset(EF_DISCARD, e->e_flags))
1603 			{
1604 				rcode = checkcompat(to, e);
1605 				ovr = false;
1606 			}
1607 		}
1608 		if (rcode != EX_OK)
1609 		{
1610 			markfailure(e, to, NULL, rcode, ovr);
1611 			giveresponse(rcode, to->q_status, m,
1612 				     NULL, ctladdr, xstart, e, to);
1613 			continue;
1614 		}
1615 		if (!quarantine && e->e_quarmsg != NULL)
1616 		{
1617 			/*
1618 			**  check_compat or checkcompat() has tried
1619 			**  to quarantine but that isn't supported.
1620 			**  Revert the attempt.
1621 			*/
1622 
1623 			e->e_quarmsg = NULL;
1624 			macdefine(&e->e_macro, A_PERM,
1625 				  macid("{quarantine}"), "");
1626 		}
1627 		if (bitset(EF_DISCARD, e->e_flags))
1628 		{
1629 			if (tTd(10, 5))
1630 			{
1631 				sm_dprintf("deliver: discarding recipient ");
1632 				printaddr(sm_debug_file(), to, false);
1633 			}
1634 
1635 			/* pretend the message was sent */
1636 			/* XXX should we log something here? */
1637 			to->q_state = QS_DISCARDED;
1638 
1639 			/*
1640 			**  Remove discard bit to prevent discard of
1641 			**  future recipients.  This is safe because the
1642 			**  true "global discard" has been handled before
1643 			**  we get here.
1644 			*/
1645 
1646 			e->e_flags &= ~EF_DISCARD;
1647 			continue;
1648 		}
1649 
1650 		/*
1651 		**  Strip quote bits from names if the mailer is dumb
1652 		**	about them.
1653 		*/
1654 
1655 		if (bitnset(M_STRIPQ, m->m_flags))
1656 		{
1657 			stripquotes(user);
1658 			stripquotes(host);
1659 		}
1660 
1661 		/*
1662 		**  Strip all leading backslashes if requested and the
1663 		**  next character is alphanumerical (the latter can
1664 		**  probably relaxed a bit, see RFC2821).
1665 		*/
1666 
1667 		if (bitnset(M_STRIPBACKSL, m->m_flags) && user[0] == '\\')
1668 			stripbackslash(user);
1669 
1670 		/* hack attack -- delivermail compatibility */
1671 		if (m == ProgMailer && *user == '|')
1672 			user++;
1673 
1674 		/*
1675 		**  If an error message has already been given, don't
1676 		**	bother to send to this address.
1677 		**
1678 		**	>>>>>>>>>> This clause assumes that the local mailer
1679 		**	>> NOTE >> cannot do any further aliasing; that
1680 		**	>>>>>>>>>> function is subsumed by sendmail.
1681 		*/
1682 
1683 		if (!QS_IS_OK(to->q_state))
1684 			continue;
1685 
1686 		/*
1687 		**  See if this user name is "special".
1688 		**	If the user name has a slash in it, assume that this
1689 		**	is a file -- send it off without further ado.  Note
1690 		**	that this type of addresses is not processed along
1691 		**	with the others, so we fudge on the To person.
1692 		*/
1693 
1694 		if (strcmp(m->m_mailer, "[FILE]") == 0)
1695 		{
1696 			macdefine(&e->e_macro, A_PERM, 'u', user);
1697 			p = to->q_home;
1698 			if (p == NULL && ctladdr != NULL)
1699 				p = ctladdr->q_home;
1700 			macdefine(&e->e_macro, A_PERM, 'z', p);
1701 			expand(m->m_argv[1], buf, sizeof buf, e);
1702 			if (strlen(buf) > 0)
1703 				rcode = mailfile(buf, m, ctladdr, SFF_CREAT, e);
1704 			else
1705 			{
1706 				syserr("empty filename specification for mailer %s",
1707 				       m->m_name);
1708 				rcode = EX_CONFIG;
1709 			}
1710 			giveresponse(rcode, to->q_status, m, NULL,
1711 				     ctladdr, xstart, e, to);
1712 			markfailure(e, to, NULL, rcode, true);
1713 			e->e_nsent++;
1714 			if (rcode == EX_OK)
1715 			{
1716 				to->q_state = QS_SENT;
1717 				if (bitnset(M_LOCALMAILER, m->m_flags) &&
1718 				    bitset(QPINGONSUCCESS, to->q_flags))
1719 				{
1720 					to->q_flags |= QDELIVERED;
1721 					to->q_status = "2.1.5";
1722 					(void) sm_io_fprintf(e->e_xfp,
1723 							     SM_TIME_DEFAULT,
1724 							     "%s... Successfully delivered\n",
1725 							     to->q_paddr);
1726 				}
1727 			}
1728 			to->q_statdate = curtime();
1729 			markstats(e, to, STATS_NORMAL);
1730 			continue;
1731 		}
1732 
1733 		/*
1734 		**  Address is verified -- add this user to mailer
1735 		**  argv, and add it to the print list of recipients.
1736 		*/
1737 
1738 		/* link together the chain of recipients */
1739 		to->q_tchain = tochain;
1740 		tochain = to;
1741 		e->e_to = "[CHAIN]";
1742 
1743 		macdefine(&e->e_macro, A_PERM, 'u', user);  /* to user */
1744 		p = to->q_home;
1745 		if (p == NULL && ctladdr != NULL)
1746 			p = ctladdr->q_home;
1747 		macdefine(&e->e_macro, A_PERM, 'z', p);  /* user's home */
1748 
1749 		/* set the ${dsn_notify} macro if applicable */
1750 		if (bitset(QHASNOTIFY, to->q_flags))
1751 		{
1752 			char notify[MAXLINE];
1753 
1754 			notify[0] = '\0';
1755 			if (bitset(QPINGONSUCCESS, to->q_flags))
1756 				(void) sm_strlcat(notify, "SUCCESS,",
1757 						  sizeof notify);
1758 			if (bitset(QPINGONFAILURE, to->q_flags))
1759 				(void) sm_strlcat(notify, "FAILURE,",
1760 						  sizeof notify);
1761 			if (bitset(QPINGONDELAY, to->q_flags))
1762 				(void) sm_strlcat(notify, "DELAY,",
1763 						  sizeof notify);
1764 
1765 			/* Set to NEVER or drop trailing comma */
1766 			if (notify[0] == '\0')
1767 				(void) sm_strlcat(notify, "NEVER",
1768 						  sizeof notify);
1769 			else
1770 				notify[strlen(notify) - 1] = '\0';
1771 
1772 			macdefine(&e->e_macro, A_TEMP,
1773 				macid("{dsn_notify}"), notify);
1774 		}
1775 		else
1776 			macdefine(&e->e_macro, A_PERM,
1777 				macid("{dsn_notify}"), NULL);
1778 
1779 		/*
1780 		**  Expand out this user into argument list.
1781 		*/
1782 
1783 		if (!clever)
1784 		{
1785 			expand(*mvp, buf, sizeof buf, e);
1786 			*pvp++ = sm_rpool_strdup_x(e->e_rpool, buf);
1787 			if (pvp >= &pv[MAXPV - 2])
1788 			{
1789 				/* allow some space for trailing parms */
1790 				break;
1791 			}
1792 		}
1793 	}
1794 
1795 	/* see if any addresses still exist */
1796 	if (tochain == NULL)
1797 	{
1798 		rcode = 0;
1799 		goto cleanup;
1800 	}
1801 
1802 	/* print out messages as full list */
1803 	strsize = 1;
1804 	for (to = tochain; to != NULL; to = to->q_tchain)
1805 		strsize += strlen(to->q_paddr) + 1;
1806 	if (strsize < TOBUFSIZE)
1807 		strsize = TOBUFSIZE;
1808 	if (strsize > tobufsize)
1809 	{
1810 		SM_FREE_CLR(tobuf);
1811 		tobuf = sm_pmalloc_x(strsize);
1812 		tobufsize = strsize;
1813 	}
1814 	p = tobuf;
1815 	*p = '\0';
1816 	for (to = tochain; to != NULL; to = to->q_tchain)
1817 	{
1818 		(void) sm_strlcpyn(p, tobufsize - (p - tobuf), 2,
1819 				   ",", to->q_paddr);
1820 		p += strlen(p);
1821 	}
1822 	e->e_to = tobuf + 1;
1823 
1824 	/*
1825 	**  Fill out any parameters after the $u parameter.
1826 	*/
1827 
1828 	if (!clever)
1829 	{
1830 		while (*++mvp != NULL)
1831 		{
1832 			expand(*mvp, buf, sizeof buf, e);
1833 			*pvp++ = sm_rpool_strdup_x(e->e_rpool, buf);
1834 			if (pvp >= &pv[MAXPV])
1835 				syserr("554 5.3.0 deliver: pv overflow after $u for %s",
1836 				       pv[0]);
1837 		}
1838 	}
1839 	*pvp++ = NULL;
1840 
1841 	/*
1842 	**  Call the mailer.
1843 	**	The argument vector gets built, pipes
1844 	**	are created as necessary, and we fork & exec as
1845 	**	appropriate.
1846 	**	If we are running SMTP, we just need to clean up.
1847 	*/
1848 
1849 	/* XXX this seems a bit wierd */
1850 	if (ctladdr == NULL && m != ProgMailer && m != FileMailer &&
1851 	    bitset(QGOODUID, e->e_from.q_flags))
1852 		ctladdr = &e->e_from;
1853 
1854 #if NAMED_BIND
1855 	if (ConfigLevel < 2)
1856 		_res.options &= ~(RES_DEFNAMES | RES_DNSRCH);	/* XXX */
1857 #endif /* NAMED_BIND */
1858 
1859 	if (tTd(11, 1))
1860 	{
1861 		sm_dprintf("openmailer:");
1862 		printav(sm_debug_file(), pv);
1863 	}
1864 	errno = 0;
1865 	SM_SET_H_ERRNO(0);
1866 	CurHostName = NULL;
1867 
1868 	/*
1869 	**  Deal with the special case of mail handled through an IPC
1870 	**  connection.
1871 	**	In this case we don't actually fork.  We must be
1872 	**	running SMTP for this to work.  We will return a
1873 	**	zero pid to indicate that we are running IPC.
1874 	**  We also handle a debug version that just talks to stdin/out.
1875 	*/
1876 
1877 	curhost = NULL;
1878 	SmtpPhase = NULL;
1879 	mci = NULL;
1880 
1881 #if XDEBUG
1882 	{
1883 		char wbuf[MAXLINE];
1884 
1885 		/* make absolutely certain 0, 1, and 2 are in use */
1886 		(void) sm_snprintf(wbuf, sizeof wbuf, "%s... openmailer(%s)",
1887 				   shortenstring(e->e_to, MAXSHORTSTR),
1888 				   m->m_name);
1889 		checkfd012(wbuf);
1890 	}
1891 #endif /* XDEBUG */
1892 
1893 	/* check for 8-bit available */
1894 	if (bitset(EF_HAS8BIT, e->e_flags) &&
1895 	    bitnset(M_7BITS, m->m_flags) &&
1896 	    (bitset(EF_DONT_MIME, e->e_flags) ||
1897 	     !(bitset(MM_MIME8BIT, MimeMode) ||
1898 	       (bitset(EF_IS_MIME, e->e_flags) &&
1899 		bitset(MM_CVTMIME, MimeMode)))))
1900 	{
1901 		e->e_status = "5.6.3";
1902 		usrerrenh(e->e_status,
1903 			  "554 Cannot send 8-bit data to 7-bit destination");
1904 		rcode = EX_DATAERR;
1905 		goto give_up;
1906 	}
1907 
1908 	if (tTd(62, 8))
1909 		checkfds("before delivery");
1910 
1911 	/* check for Local Person Communication -- not for mortals!!! */
1912 	if (strcmp(m->m_mailer, "[LPC]") == 0)
1913 	{
1914 		if (clever)
1915 		{
1916 			/* flush any expired connections */
1917 			(void) mci_scan(NULL);
1918 
1919 			/* try to get a cached connection or just a slot */
1920 			mci = mci_get(m->m_name, m);
1921 			if (mci->mci_host == NULL)
1922 				mci->mci_host = m->m_name;
1923 			CurHostName = mci->mci_host;
1924 			if (mci->mci_state != MCIS_CLOSED)
1925 			{
1926 				message("Using cached SMTP/LPC connection for %s...",
1927 					m->m_name);
1928 				mci->mci_deliveries++;
1929 				goto do_transfer;
1930 			}
1931 		}
1932 		else
1933 		{
1934 			mci = mci_new(e->e_rpool);
1935 		}
1936 		mci->mci_in = smioin;
1937 		mci->mci_out = smioout;
1938 		mci->mci_mailer = m;
1939 		mci->mci_host = m->m_name;
1940 		if (clever)
1941 		{
1942 			mci->mci_state = MCIS_OPENING;
1943 			mci_cache(mci);
1944 		}
1945 		else
1946 			mci->mci_state = MCIS_OPEN;
1947 	}
1948 	else if (strcmp(m->m_mailer, "[IPC]") == 0)
1949 	{
1950 		register int i;
1951 
1952 		if (pv[0] == NULL || pv[1] == NULL || pv[1][0] == '\0')
1953 		{
1954 			syserr("null destination for %s mailer", m->m_mailer);
1955 			rcode = EX_CONFIG;
1956 			goto give_up;
1957 		}
1958 
1959 # if NETUNIX
1960 		if (strcmp(pv[0], "FILE") == 0)
1961 		{
1962 			curhost = CurHostName = "localhost";
1963 			mux_path = pv[1];
1964 		}
1965 		else
1966 # endif /* NETUNIX */
1967 		{
1968 			CurHostName = pv[1];
1969 			curhost = hostsignature(m, pv[1]);
1970 		}
1971 
1972 		if (curhost == NULL || curhost[0] == '\0')
1973 		{
1974 			syserr("null host signature for %s", pv[1]);
1975 			rcode = EX_CONFIG;
1976 			goto give_up;
1977 		}
1978 
1979 		if (!clever)
1980 		{
1981 			syserr("554 5.3.5 non-clever IPC");
1982 			rcode = EX_CONFIG;
1983 			goto give_up;
1984 		}
1985 		if (pv[2] != NULL
1986 # if NETUNIX
1987 		    && mux_path == NULL
1988 # endif /* NETUNIX */
1989 		    )
1990 		{
1991 			port = htons((unsigned short) atoi(pv[2]));
1992 			if (port == 0)
1993 			{
1994 # ifdef NO_GETSERVBYNAME
1995 				syserr("Invalid port number: %s", pv[2]);
1996 # else /* NO_GETSERVBYNAME */
1997 				struct servent *sp = getservbyname(pv[2], "tcp");
1998 
1999 				if (sp == NULL)
2000 					syserr("Service %s unknown", pv[2]);
2001 				else
2002 					port = sp->s_port;
2003 # endif /* NO_GETSERVBYNAME */
2004 			}
2005 		}
2006 
2007 		nummxhosts = parse_hostsignature(curhost, mxhosts, m);
2008 		if (TimeOuts.to_aconnect > 0)
2009 			enough = curtime() + TimeOuts.to_aconnect;
2010 tryhost:
2011 		while (hostnum < nummxhosts)
2012 		{
2013 			char sep = ':';
2014 			char *endp;
2015 			static char hostbuf[MAXNAME + 1];
2016 			bool tried_fallbacksmarthost = false;
2017 
2018 # if NETINET6
2019 			if (*mxhosts[hostnum] == '[')
2020 			{
2021 				endp = strchr(mxhosts[hostnum] + 1, ']');
2022 				if (endp != NULL)
2023 					endp = strpbrk(endp + 1, ":,");
2024 			}
2025 			else
2026 				endp = strpbrk(mxhosts[hostnum], ":,");
2027 # else /* NETINET6 */
2028 			endp = strpbrk(mxhosts[hostnum], ":,");
2029 # endif /* NETINET6 */
2030 			if (endp != NULL)
2031 			{
2032 				sep = *endp;
2033 				*endp = '\0';
2034 			}
2035 
2036 			if (hostnum == 1 && skip_back != NULL)
2037 			{
2038 				/*
2039 				**  Coattail piggybacking is no longer an
2040 				**  option with the mail host next to be tried
2041 				**  no longer the lowest MX preference
2042 				**  (hostnum == 1 meaning we're on the second
2043 				**  preference). We do not try to coattail
2044 				**  piggyback more than the first MX preference.
2045 				**  Revert 'tochain' to last location for
2046 				**  coincidental piggybacking. This works this
2047 				**  easily because the q_tchain kept getting
2048 				**  added to the top of the linked list.
2049 				*/
2050 
2051 				tochain = skip_back;
2052 			}
2053 
2054 			if (*mxhosts[hostnum] == '\0')
2055 			{
2056 				syserr("deliver: null host name in signature");
2057 				hostnum++;
2058 				if (endp != NULL)
2059 					*endp = sep;
2060 				continue;
2061 			}
2062 			(void) sm_strlcpy(hostbuf, mxhosts[hostnum],
2063 					  sizeof hostbuf);
2064 			hostnum++;
2065 			if (endp != NULL)
2066 				*endp = sep;
2067 
2068   one_last_try:
2069 			/* see if we already know that this host is fried */
2070 			CurHostName = hostbuf;
2071 			mci = mci_get(hostbuf, m);
2072 			if (mci->mci_state != MCIS_CLOSED)
2073 			{
2074 				char *type;
2075 
2076 				if (tTd(11, 1))
2077 				{
2078 					sm_dprintf("openmailer: ");
2079 					mci_dump(sm_debug_file(), mci, false);
2080 				}
2081 				CurHostName = mci->mci_host;
2082 				if (bitnset(M_LMTP, m->m_flags))
2083 					type = "L";
2084 				else if (bitset(MCIF_ESMTP, mci->mci_flags))
2085 					type = "ES";
2086 				else
2087 					type = "S";
2088 				message("Using cached %sMTP connection to %s via %s...",
2089 					type, hostbuf, m->m_name);
2090 				mci->mci_deliveries++;
2091 				break;
2092 			}
2093 			mci->mci_mailer = m;
2094 			if (mci->mci_exitstat != EX_OK)
2095 			{
2096 				if (mci->mci_exitstat == EX_TEMPFAIL)
2097 					goodmxfound = true;
2098 
2099 				/* Try FallbackSmartHost? */
2100 				if (should_try_fbsh(e, &tried_fallbacksmarthost,
2101 						    hostbuf, sizeof hostbuf,
2102 						    mci->mci_exitstat))
2103 					goto one_last_try;
2104 
2105 				continue;
2106 			}
2107 
2108 			if (mci_lock_host(mci) != EX_OK)
2109 			{
2110 				mci_setstat(mci, EX_TEMPFAIL, "4.4.5", NULL);
2111 				goodmxfound = true;
2112 				continue;
2113 			}
2114 
2115 			/* try the connection */
2116 			sm_setproctitle(true, e, "%s %s: %s",
2117 					qid_printname(e),
2118 					hostbuf, "user open");
2119 # if NETUNIX
2120 			if (mux_path != NULL)
2121 			{
2122 				message("Connecting to %s via %s...",
2123 					mux_path, m->m_name);
2124 				i = makeconnection_ds((char *) mux_path, mci);
2125 			}
2126 			else
2127 # endif /* NETUNIX */
2128 			{
2129 				if (port == 0)
2130 					message("Connecting to %s via %s...",
2131 						hostbuf, m->m_name);
2132 				else
2133 					message("Connecting to %s port %d via %s...",
2134 						hostbuf, ntohs(port),
2135 						m->m_name);
2136 				i = makeconnection(hostbuf, port, mci, e,
2137 						   enough);
2138 			}
2139 			mci->mci_errno = errno;
2140 			mci->mci_lastuse = curtime();
2141 			mci->mci_deliveries = 0;
2142 			mci->mci_exitstat = i;
2143 # if NAMED_BIND
2144 			mci->mci_herrno = h_errno;
2145 # endif /* NAMED_BIND */
2146 
2147 			/*
2148 			**  Have we tried long enough to get a connection?
2149 			**	If yes, skip to the fallback MX hosts
2150 			**	(if existent).
2151 			*/
2152 
2153 			if (enough > 0 && mci->mci_lastuse >= enough)
2154 			{
2155 				int h;
2156 # if NAMED_BIND
2157 				extern int NumFallbackMXHosts;
2158 # else /* NAMED_BIND */
2159 				const int NumFallbackMXHosts = 0;
2160 # endif /* NAMED_BIND */
2161 
2162 				if (hostnum < nummxhosts && LogLevel > 9)
2163 					sm_syslog(LOG_INFO, e->e_id,
2164 						  "Timeout.to_aconnect occurred before exhausting all addresses");
2165 
2166 				/* turn off timeout if fallback available */
2167 				if (NumFallbackMXHosts > 0)
2168 					enough = 0;
2169 
2170 				/* skip to a fallback MX host */
2171 				h = nummxhosts - NumFallbackMXHosts;
2172 				if (hostnum < h)
2173 					hostnum = h;
2174 			}
2175 			if (i == EX_OK)
2176 			{
2177 				goodmxfound = true;
2178 				markstats(e, firstto, STATS_CONNECT);
2179 				mci->mci_state = MCIS_OPENING;
2180 				mci_cache(mci);
2181 				if (TrafficLogFile != NULL)
2182 					(void) sm_io_fprintf(TrafficLogFile,
2183 							     SM_TIME_DEFAULT,
2184 							     "%05d === CONNECT %s\n",
2185 							     (int) CurrentPid,
2186 							     hostbuf);
2187 				break;
2188 			}
2189 			else
2190 			{
2191 				/* Try FallbackSmartHost? */
2192 				if (should_try_fbsh(e, &tried_fallbacksmarthost,
2193 						    hostbuf, sizeof hostbuf, i))
2194 					goto one_last_try;
2195 
2196 				if (tTd(11, 1))
2197 					sm_dprintf("openmailer: makeconnection => stat=%d, errno=%d\n",
2198 						   i, errno);
2199 				if (i == EX_TEMPFAIL)
2200 					goodmxfound = true;
2201 				mci_unlock_host(mci);
2202 			}
2203 
2204 			/* enter status of this host */
2205 			setstat(i);
2206 
2207 			/* should print some message here for -v mode */
2208 		}
2209 		if (mci == NULL)
2210 		{
2211 			syserr("deliver: no host name");
2212 			rcode = EX_SOFTWARE;
2213 			goto give_up;
2214 		}
2215 		mci->mci_pid = 0;
2216 	}
2217 	else
2218 	{
2219 		/* flush any expired connections */
2220 		(void) mci_scan(NULL);
2221 		mci = NULL;
2222 
2223 		if (bitnset(M_LMTP, m->m_flags))
2224 		{
2225 			/* try to get a cached connection */
2226 			mci = mci_get(m->m_name, m);
2227 			if (mci->mci_host == NULL)
2228 				mci->mci_host = m->m_name;
2229 			CurHostName = mci->mci_host;
2230 			if (mci->mci_state != MCIS_CLOSED)
2231 			{
2232 				message("Using cached LMTP connection for %s...",
2233 					m->m_name);
2234 				mci->mci_deliveries++;
2235 				goto do_transfer;
2236 			}
2237 		}
2238 
2239 		/* announce the connection to verbose listeners */
2240 		if (host == NULL || host[0] == '\0')
2241 			message("Connecting to %s...", m->m_name);
2242 		else
2243 			message("Connecting to %s via %s...", host, m->m_name);
2244 		if (TrafficLogFile != NULL)
2245 		{
2246 			char **av;
2247 
2248 			(void) sm_io_fprintf(TrafficLogFile, SM_TIME_DEFAULT,
2249 					     "%05d === EXEC", (int) CurrentPid);
2250 			for (av = pv; *av != NULL; av++)
2251 				(void) sm_io_fprintf(TrafficLogFile,
2252 						     SM_TIME_DEFAULT, " %s",
2253 						     *av);
2254 			(void) sm_io_fprintf(TrafficLogFile, SM_TIME_DEFAULT,
2255 					     "\n");
2256 		}
2257 
2258 #if XDEBUG
2259 		checkfd012("before creating mail pipe");
2260 #endif /* XDEBUG */
2261 
2262 		/* create a pipe to shove the mail through */
2263 		if (pipe(mpvect) < 0)
2264 		{
2265 			syserr("%s... openmailer(%s): pipe (to mailer)",
2266 			       shortenstring(e->e_to, MAXSHORTSTR), m->m_name);
2267 			if (tTd(11, 1))
2268 				sm_dprintf("openmailer: NULL\n");
2269 			rcode = EX_OSERR;
2270 			goto give_up;
2271 		}
2272 
2273 #if XDEBUG
2274 		/* make sure we didn't get one of the standard I/O files */
2275 		if (mpvect[0] < 3 || mpvect[1] < 3)
2276 		{
2277 			syserr("%s... openmailer(%s): bogus mpvect %d %d",
2278 			       shortenstring(e->e_to, MAXSHORTSTR), m->m_name,
2279 			       mpvect[0], mpvect[1]);
2280 			printopenfds(true);
2281 			if (tTd(11, 1))
2282 				sm_dprintf("openmailer: NULL\n");
2283 			rcode = EX_OSERR;
2284 			goto give_up;
2285 		}
2286 
2287 		/* make sure system call isn't dead meat */
2288 		checkfdopen(mpvect[0], "mpvect[0]");
2289 		checkfdopen(mpvect[1], "mpvect[1]");
2290 		if (mpvect[0] == mpvect[1] ||
2291 		    (e->e_lockfp != NULL &&
2292 		     (mpvect[0] == sm_io_getinfo(e->e_lockfp, SM_IO_WHAT_FD,
2293 						 NULL) ||
2294 		      mpvect[1] == sm_io_getinfo(e->e_lockfp, SM_IO_WHAT_FD,
2295 						 NULL))))
2296 		{
2297 			if (e->e_lockfp == NULL)
2298 				syserr("%s... openmailer(%s): overlapping mpvect %d %d",
2299 				       shortenstring(e->e_to, MAXSHORTSTR),
2300 				       m->m_name, mpvect[0], mpvect[1]);
2301 			else
2302 				syserr("%s... openmailer(%s): overlapping mpvect %d %d, lockfp = %d",
2303 				       shortenstring(e->e_to, MAXSHORTSTR),
2304 				       m->m_name, mpvect[0], mpvect[1],
2305 				       sm_io_getinfo(e->e_lockfp,
2306 						     SM_IO_WHAT_FD, NULL));
2307 		}
2308 #endif /* XDEBUG */
2309 
2310 		/* create a return pipe */
2311 		if (pipe(rpvect) < 0)
2312 		{
2313 			syserr("%s... openmailer(%s): pipe (from mailer)",
2314 			       shortenstring(e->e_to, MAXSHORTSTR),
2315 			       m->m_name);
2316 			(void) close(mpvect[0]);
2317 			(void) close(mpvect[1]);
2318 			if (tTd(11, 1))
2319 				sm_dprintf("openmailer: NULL\n");
2320 			rcode = EX_OSERR;
2321 			goto give_up;
2322 		}
2323 #if XDEBUG
2324 		checkfdopen(rpvect[0], "rpvect[0]");
2325 		checkfdopen(rpvect[1], "rpvect[1]");
2326 #endif /* XDEBUG */
2327 
2328 		/*
2329 		**  Actually fork the mailer process.
2330 		**	DOFORK is clever about retrying.
2331 		**
2332 		**	Dispose of SIGCHLD signal catchers that may be laying
2333 		**	around so that endmailer will get it.
2334 		*/
2335 
2336 		if (e->e_xfp != NULL)	/* for debugging */
2337 			(void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT);
2338 		(void) sm_io_flush(smioout, SM_TIME_DEFAULT);
2339 		(void) sm_signal(SIGCHLD, SIG_DFL);
2340 
2341 
2342 		DOFORK(FORK);
2343 		/* pid is set by DOFORK */
2344 
2345 		if (pid < 0)
2346 		{
2347 			/* failure */
2348 			syserr("%s... openmailer(%s): cannot fork",
2349 			       shortenstring(e->e_to, MAXSHORTSTR), m->m_name);
2350 			(void) close(mpvect[0]);
2351 			(void) close(mpvect[1]);
2352 			(void) close(rpvect[0]);
2353 			(void) close(rpvect[1]);
2354 			if (tTd(11, 1))
2355 				sm_dprintf("openmailer: NULL\n");
2356 			rcode = EX_OSERR;
2357 			goto give_up;
2358 		}
2359 		else if (pid == 0)
2360 		{
2361 			int save_errno;
2362 			int sff;
2363 			int new_euid = NO_UID;
2364 			int new_ruid = NO_UID;
2365 			int new_gid = NO_GID;
2366 			char *user = NULL;
2367 			struct stat stb;
2368 			extern int DtableSize;
2369 
2370 			CurrentPid = getpid();
2371 
2372 			/* clear the events to turn off SIGALRMs */
2373 			sm_clear_events();
2374 
2375 			/* Reset global flags */
2376 			RestartRequest = NULL;
2377 			RestartWorkGroup = false;
2378 			ShutdownRequest = NULL;
2379 			PendingSignal = 0;
2380 
2381 			if (e->e_lockfp != NULL)
2382 				(void) close(sm_io_getinfo(e->e_lockfp,
2383 							   SM_IO_WHAT_FD,
2384 							   NULL));
2385 
2386 			/* child -- set up input & exec mailer */
2387 			(void) sm_signal(SIGALRM, sm_signal_noop);
2388 			(void) sm_signal(SIGCHLD, SIG_DFL);
2389 			(void) sm_signal(SIGHUP, SIG_IGN);
2390 			(void) sm_signal(SIGINT, SIG_IGN);
2391 			(void) sm_signal(SIGTERM, SIG_DFL);
2392 # ifdef SIGUSR1
2393 			(void) sm_signal(SIGUSR1, sm_signal_noop);
2394 # endif /* SIGUSR1 */
2395 
2396 			if (m != FileMailer || stat(tochain->q_user, &stb) < 0)
2397 				stb.st_mode = 0;
2398 
2399 # if HASSETUSERCONTEXT
2400 			/*
2401 			**  Set user resources.
2402 			*/
2403 
2404 			if (contextaddr != NULL)
2405 			{
2406 				int sucflags;
2407 				struct passwd *pwd;
2408 
2409 				if (contextaddr->q_ruser != NULL)
2410 					pwd = sm_getpwnam(contextaddr->q_ruser);
2411 				else
2412 					pwd = sm_getpwnam(contextaddr->q_user);
2413 				sucflags = LOGIN_SETRESOURCES|LOGIN_SETPRIORITY;
2414 #ifdef LOGIN_SETMAC
2415 				sucflags |= LOGIN_SETMAC;
2416 #endif /* LOGIN_SETMAC */
2417 				if (pwd != NULL &&
2418 				    setusercontext(NULL, pwd, pwd->pw_uid,
2419 						   sucflags) == -1 &&
2420 				    suidwarn)
2421 				{
2422 					syserr("openmailer: setusercontext() failed");
2423 					exit(EX_TEMPFAIL);
2424 				}
2425 			}
2426 # endif /* HASSETUSERCONTEXT */
2427 
2428 #if HASNICE
2429 			/* tweak niceness */
2430 			if (m->m_nice != 0)
2431 				(void) nice(m->m_nice);
2432 #endif /* HASNICE */
2433 
2434 			/* reset group id */
2435 			if (bitnset(M_SPECIFIC_UID, m->m_flags))
2436 			{
2437 				if (m->m_gid == NO_GID)
2438 					new_gid = RunAsGid;
2439 				else
2440 					new_gid = m->m_gid;
2441 			}
2442 			else if (bitset(S_ISGID, stb.st_mode))
2443 				new_gid = stb.st_gid;
2444 			else if (ctladdr != NULL && ctladdr->q_gid != 0)
2445 			{
2446 				if (!DontInitGroups)
2447 				{
2448 					user = ctladdr->q_ruser;
2449 					if (user == NULL)
2450 						user = ctladdr->q_user;
2451 
2452 					if (initgroups(user,
2453 						       ctladdr->q_gid) == -1
2454 					    && suidwarn)
2455 					{
2456 						syserr("openmailer: initgroups(%s, %d) failed",
2457 							user, ctladdr->q_gid);
2458 						exit(EX_TEMPFAIL);
2459 					}
2460 				}
2461 				else
2462 				{
2463 					GIDSET_T gidset[1];
2464 
2465 					gidset[0] = ctladdr->q_gid;
2466 					if (setgroups(1, gidset) == -1
2467 					    && suidwarn)
2468 					{
2469 						syserr("openmailer: setgroups() failed");
2470 						exit(EX_TEMPFAIL);
2471 					}
2472 				}
2473 				new_gid = ctladdr->q_gid;
2474 			}
2475 			else
2476 			{
2477 				if (!DontInitGroups)
2478 				{
2479 					user = DefUser;
2480 					if (initgroups(DefUser, DefGid) == -1 &&
2481 					    suidwarn)
2482 					{
2483 						syserr("openmailer: initgroups(%s, %d) failed",
2484 						       DefUser, DefGid);
2485 						exit(EX_TEMPFAIL);
2486 					}
2487 				}
2488 				else
2489 				{
2490 					GIDSET_T gidset[1];
2491 
2492 					gidset[0] = DefGid;
2493 					if (setgroups(1, gidset) == -1
2494 					    && suidwarn)
2495 					{
2496 						syserr("openmailer: setgroups() failed");
2497 						exit(EX_TEMPFAIL);
2498 					}
2499 				}
2500 				if (m->m_gid == NO_GID)
2501 					new_gid = DefGid;
2502 				else
2503 					new_gid = m->m_gid;
2504 			}
2505 			if (new_gid != NO_GID)
2506 			{
2507 				if (RunAsUid != 0 &&
2508 				    bitnset(M_SPECIFIC_UID, m->m_flags) &&
2509 				    new_gid != getgid() &&
2510 				    new_gid != getegid())
2511 				{
2512 					/* Only root can change the gid */
2513 					syserr("openmailer: insufficient privileges to change gid, RunAsUid=%d, new_gid=%d, gid=%d, egid=%d",
2514 					       (int) RunAsUid, (int) new_gid,
2515 					       (int) getgid(), (int) getegid());
2516 					exit(EX_TEMPFAIL);
2517 				}
2518 
2519 				if (setgid(new_gid) < 0 && suidwarn)
2520 				{
2521 					syserr("openmailer: setgid(%ld) failed",
2522 					       (long) new_gid);
2523 					exit(EX_TEMPFAIL);
2524 				}
2525 			}
2526 
2527 			/* change root to some "safe" directory */
2528 			if (m->m_rootdir != NULL)
2529 			{
2530 				expand(m->m_rootdir, cbuf, sizeof cbuf, e);
2531 				if (tTd(11, 20))
2532 					sm_dprintf("openmailer: chroot %s\n",
2533 						   cbuf);
2534 				if (chroot(cbuf) < 0)
2535 				{
2536 					syserr("openmailer: Cannot chroot(%s)",
2537 					       cbuf);
2538 					exit(EX_TEMPFAIL);
2539 				}
2540 				if (chdir("/") < 0)
2541 				{
2542 					syserr("openmailer: cannot chdir(/)");
2543 					exit(EX_TEMPFAIL);
2544 				}
2545 			}
2546 
2547 			/* reset user id */
2548 			endpwent();
2549 			sm_mbdb_terminate();
2550 			if (bitnset(M_SPECIFIC_UID, m->m_flags))
2551 			{
2552 				if (m->m_uid == NO_UID)
2553 					new_euid = RunAsUid;
2554 				else
2555 					new_euid = m->m_uid;
2556 
2557 				/*
2558 				**  Undo the effects of the uid change in main
2559 				**  for signal handling.  The real uid may
2560 				**  be used by mailer in adding a "From "
2561 				**  line.
2562 				*/
2563 
2564 				if (RealUid != 0 && RealUid != getuid())
2565 				{
2566 # if MAILER_SETUID_METHOD == USE_SETEUID
2567 #  if HASSETREUID
2568 					if (setreuid(RealUid, geteuid()) < 0)
2569 					{
2570 						syserr("openmailer: setreuid(%d, %d) failed",
2571 						       (int) RealUid, (int) geteuid());
2572 						exit(EX_OSERR);
2573 					}
2574 #  endif /* HASSETREUID */
2575 # endif /* MAILER_SETUID_METHOD == USE_SETEUID */
2576 # if MAILER_SETUID_METHOD == USE_SETREUID
2577 					new_ruid = RealUid;
2578 # endif /* MAILER_SETUID_METHOD == USE_SETREUID */
2579 				}
2580 			}
2581 			else if (bitset(S_ISUID, stb.st_mode))
2582 				new_ruid = stb.st_uid;
2583 			else if (ctladdr != NULL && ctladdr->q_uid != 0)
2584 				new_ruid = ctladdr->q_uid;
2585 			else if (m->m_uid != NO_UID)
2586 				new_ruid = m->m_uid;
2587 			else
2588 				new_ruid = DefUid;
2589 
2590 # if _FFR_USE_SETLOGIN
2591 			/* run disconnected from terminal and set login name */
2592 			if (setsid() >= 0 &&
2593 			    ctladdr != NULL && ctladdr->q_uid != 0 &&
2594 			    new_euid == ctladdr->q_uid)
2595 			{
2596 				struct passwd *pwd;
2597 
2598 				pwd = sm_getpwuid(ctladdr->q_uid);
2599 				if (pwd != NULL && suidwarn)
2600 					(void) setlogin(pwd->pw_name);
2601 				endpwent();
2602 			}
2603 # endif /* _FFR_USE_SETLOGIN */
2604 
2605 			if (new_euid != NO_UID)
2606 			{
2607 				if (RunAsUid != 0 && new_euid != RunAsUid)
2608 				{
2609 					/* Only root can change the uid */
2610 					syserr("openmailer: insufficient privileges to change uid, new_euid=%d, RunAsUid=%d",
2611 					       (int) new_euid, (int) RunAsUid);
2612 					exit(EX_TEMPFAIL);
2613 				}
2614 
2615 				vendor_set_uid(new_euid);
2616 # if MAILER_SETUID_METHOD == USE_SETEUID
2617 				if (seteuid(new_euid) < 0 && suidwarn)
2618 				{
2619 					syserr("openmailer: seteuid(%ld) failed",
2620 					       (long) new_euid);
2621 					exit(EX_TEMPFAIL);
2622 				}
2623 # endif /* MAILER_SETUID_METHOD == USE_SETEUID */
2624 # if MAILER_SETUID_METHOD == USE_SETREUID
2625 				if (setreuid(new_ruid, new_euid) < 0 && suidwarn)
2626 				{
2627 					syserr("openmailer: setreuid(%ld, %ld) failed",
2628 					       (long) new_ruid, (long) new_euid);
2629 					exit(EX_TEMPFAIL);
2630 				}
2631 # endif /* MAILER_SETUID_METHOD == USE_SETREUID */
2632 # if MAILER_SETUID_METHOD == USE_SETUID
2633 				if (new_euid != geteuid() && setuid(new_euid) < 0 && suidwarn)
2634 				{
2635 					syserr("openmailer: setuid(%ld) failed",
2636 					       (long) new_euid);
2637 					exit(EX_TEMPFAIL);
2638 				}
2639 # endif /* MAILER_SETUID_METHOD == USE_SETUID */
2640 			}
2641 			else if (new_ruid != NO_UID)
2642 			{
2643 				vendor_set_uid(new_ruid);
2644 				if (setuid(new_ruid) < 0 && suidwarn)
2645 				{
2646 					syserr("openmailer: setuid(%ld) failed",
2647 					       (long) new_ruid);
2648 					exit(EX_TEMPFAIL);
2649 				}
2650 			}
2651 
2652 			if (tTd(11, 2))
2653 				sm_dprintf("openmailer: running as r/euid=%d/%d, r/egid=%d/%d\n",
2654 					   (int) getuid(), (int) geteuid(),
2655 					   (int) getgid(), (int) getegid());
2656 
2657 			/* move into some "safe" directory */
2658 			if (m->m_execdir != NULL)
2659 			{
2660 				char *q;
2661 
2662 				for (p = m->m_execdir; p != NULL; p = q)
2663 				{
2664 					q = strchr(p, ':');
2665 					if (q != NULL)
2666 						*q = '\0';
2667 					expand(p, cbuf, sizeof cbuf, e);
2668 					if (q != NULL)
2669 						*q++ = ':';
2670 					if (tTd(11, 20))
2671 						sm_dprintf("openmailer: trydir %s\n",
2672 							   cbuf);
2673 					if (cbuf[0] != '\0' &&
2674 					    chdir(cbuf) >= 0)
2675 						break;
2676 				}
2677 			}
2678 
2679 			/* Check safety of program to be run */
2680 			sff = SFF_ROOTOK|SFF_EXECOK;
2681 			if (!bitnset(DBS_RUNWRITABLEPROGRAM,
2682 				     DontBlameSendmail))
2683 				sff |= SFF_NOGWFILES|SFF_NOWWFILES;
2684 			if (bitnset(DBS_RUNPROGRAMINUNSAFEDIRPATH,
2685 				    DontBlameSendmail))
2686 				sff |= SFF_NOPATHCHECK;
2687 			else
2688 				sff |= SFF_SAFEDIRPATH;
2689 			ret = safefile(m->m_mailer, getuid(), getgid(),
2690 				       user, sff, 0, NULL);
2691 			if (ret != 0)
2692 				sm_syslog(LOG_INFO, e->e_id,
2693 					  "Warning: program %s unsafe: %s",
2694 					  m->m_mailer, sm_errstring(ret));
2695 
2696 			/* arrange to filter std & diag output of command */
2697 			(void) close(rpvect[0]);
2698 			if (dup2(rpvect[1], STDOUT_FILENO) < 0)
2699 			{
2700 				syserr("%s... openmailer(%s): cannot dup pipe %d for stdout",
2701 				       shortenstring(e->e_to, MAXSHORTSTR),
2702 				       m->m_name, rpvect[1]);
2703 				_exit(EX_OSERR);
2704 			}
2705 			(void) close(rpvect[1]);
2706 
2707 			if (dup2(STDOUT_FILENO, STDERR_FILENO) < 0)
2708 			{
2709 				syserr("%s... openmailer(%s): cannot dup stdout for stderr",
2710 				       shortenstring(e->e_to, MAXSHORTSTR),
2711 				       m->m_name);
2712 				_exit(EX_OSERR);
2713 			}
2714 
2715 			/* arrange to get standard input */
2716 			(void) close(mpvect[1]);
2717 			if (dup2(mpvect[0], STDIN_FILENO) < 0)
2718 			{
2719 				syserr("%s... openmailer(%s): cannot dup pipe %d for stdin",
2720 				       shortenstring(e->e_to, MAXSHORTSTR),
2721 				       m->m_name, mpvect[0]);
2722 				_exit(EX_OSERR);
2723 			}
2724 			(void) close(mpvect[0]);
2725 
2726 			/* arrange for all the files to be closed */
2727 			sm_close_on_exec(STDERR_FILENO + 1, DtableSize);
2728 
2729 # if !_FFR_USE_SETLOGIN
2730 			/* run disconnected from terminal */
2731 			(void) setsid();
2732 # endif /* !_FFR_USE_SETLOGIN */
2733 
2734 			/* try to execute the mailer */
2735 			(void) execve(m->m_mailer, (ARGV_T) pv,
2736 				      (ARGV_T) UserEnviron);
2737 			save_errno = errno;
2738 			syserr("Cannot exec %s", m->m_mailer);
2739 			if (bitnset(M_LOCALMAILER, m->m_flags) ||
2740 			    transienterror(save_errno))
2741 				_exit(EX_OSERR);
2742 			_exit(EX_UNAVAILABLE);
2743 		}
2744 
2745 		/*
2746 		**  Set up return value.
2747 		*/
2748 
2749 		if (mci == NULL)
2750 		{
2751 			if (clever)
2752 			{
2753 				/*
2754 				**  Allocate from general heap, not
2755 				**  envelope rpool, because this mci
2756 				**  is going to be cached.
2757 				*/
2758 
2759 				mci = mci_new(NULL);
2760 			}
2761 			else
2762 			{
2763 				/*
2764 				**  Prevent a storage leak by allocating
2765 				**  this from the envelope rpool.
2766 				*/
2767 
2768 				mci = mci_new(e->e_rpool);
2769 			}
2770 		}
2771 		mci->mci_mailer = m;
2772 		if (clever)
2773 		{
2774 			mci->mci_state = MCIS_OPENING;
2775 			mci_cache(mci);
2776 		}
2777 		else
2778 		{
2779 			mci->mci_state = MCIS_OPEN;
2780 		}
2781 		mci->mci_pid = pid;
2782 		(void) close(mpvect[0]);
2783 		mci->mci_out = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT,
2784 					  (void *) &(mpvect[1]), SM_IO_WRONLY_B,
2785 					  NULL);
2786 		if (mci->mci_out == NULL)
2787 		{
2788 			syserr("deliver: cannot create mailer output channel, fd=%d",
2789 			       mpvect[1]);
2790 			(void) close(mpvect[1]);
2791 			(void) close(rpvect[0]);
2792 			(void) close(rpvect[1]);
2793 			rcode = EX_OSERR;
2794 			goto give_up;
2795 		}
2796 
2797 		(void) close(rpvect[1]);
2798 		mci->mci_in = sm_io_open(SmFtStdiofd, SM_TIME_DEFAULT,
2799 					 (void *) &(rpvect[0]), SM_IO_RDONLY_B,
2800 					 NULL);
2801 		if (mci->mci_in == NULL)
2802 		{
2803 			syserr("deliver: cannot create mailer input channel, fd=%d",
2804 			       mpvect[1]);
2805 			(void) close(rpvect[0]);
2806 			(void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT);
2807 			mci->mci_out = NULL;
2808 			rcode = EX_OSERR;
2809 			goto give_up;
2810 		}
2811 	}
2812 
2813 	/*
2814 	**  If we are in SMTP opening state, send initial protocol.
2815 	*/
2816 
2817 	if (bitnset(M_7BITS, m->m_flags) &&
2818 	    (!clever || mci->mci_state == MCIS_OPENING))
2819 		mci->mci_flags |= MCIF_7BIT;
2820 	if (clever && mci->mci_state != MCIS_CLOSED)
2821 	{
2822 # if STARTTLS || SASL
2823 		int dotpos;
2824 		char *srvname;
2825 		extern SOCKADDR CurHostAddr;
2826 # endif /* STARTTLS || SASL */
2827 
2828 # if SASL
2829 #  define DONE_AUTH(f)		bitset(MCIF_AUTHACT, f)
2830 # endif /* SASL */
2831 # if STARTTLS
2832 #  define DONE_STARTTLS(f)	bitset(MCIF_TLSACT, f)
2833 # endif /* STARTTLS */
2834 # define ONLY_HELO(f)		bitset(MCIF_ONLY_EHLO, f)
2835 # define SET_HELO(f)		f |= MCIF_ONLY_EHLO
2836 # define CLR_HELO(f)		f &= ~MCIF_ONLY_EHLO
2837 
2838 # if STARTTLS || SASL
2839 		/* don't use CurHostName, it is changed in many places */
2840 		if (mci->mci_host != NULL)
2841 		{
2842 			srvname = mci->mci_host;
2843 			dotpos = strlen(srvname) - 1;
2844 			if (dotpos >= 0)
2845 			{
2846 				if (srvname[dotpos] == '.')
2847 					srvname[dotpos] = '\0';
2848 				else
2849 					dotpos = -1;
2850 			}
2851 		}
2852 		else if (mci->mci_mailer != NULL)
2853 		{
2854 			srvname = mci->mci_mailer->m_name;
2855 			dotpos = -1;
2856 		}
2857 		else
2858 		{
2859 			srvname = "local";
2860 			dotpos = -1;
2861 		}
2862 
2863 		/* don't set {server_name} to NULL or "": see getauth() */
2864 		macdefine(&mci->mci_macro, A_TEMP, macid("{server_name}"),
2865 			  srvname);
2866 
2867 		/* CurHostAddr is set by makeconnection() and mci_get() */
2868 		if (CurHostAddr.sa.sa_family != 0)
2869 		{
2870 			macdefine(&mci->mci_macro, A_TEMP,
2871 				  macid("{server_addr}"),
2872 				  anynet_ntoa(&CurHostAddr));
2873 		}
2874 		else if (mci->mci_mailer != NULL)
2875 		{
2876 			/* mailer name is unique, use it as address */
2877 			macdefine(&mci->mci_macro, A_PERM,
2878 				  macid("{server_addr}"),
2879 				  mci->mci_mailer->m_name);
2880 		}
2881 		else
2882 		{
2883 			/* don't set it to NULL or "": see getauth() */
2884 			macdefine(&mci->mci_macro, A_PERM,
2885 				  macid("{server_addr}"), "0");
2886 		}
2887 
2888 		/* undo change of srvname (mci->mci_host) */
2889 		if (dotpos >= 0)
2890 			srvname[dotpos] = '.';
2891 
2892 reconnect:	/* after switching to an encrypted connection */
2893 # endif /* STARTTLS || SASL */
2894 
2895 		/* set the current connection information */
2896 		e->e_mci = mci;
2897 # if SASL
2898 		mci->mci_saslcap = NULL;
2899 # endif /* SASL */
2900 		smtpinit(m, mci, e, ONLY_HELO(mci->mci_flags));
2901 		CLR_HELO(mci->mci_flags);
2902 
2903 		if (IS_DLVR_RETURN(e))
2904 		{
2905 			/*
2906 			**  Check whether other side can deliver e-mail
2907 			**  fast enough
2908 			*/
2909 
2910 			if (!bitset(MCIF_DLVR_BY, mci->mci_flags))
2911 			{
2912 				e->e_status = "5.4.7";
2913 				usrerrenh(e->e_status,
2914 					  "554 Server does not support Deliver By");
2915 				rcode = EX_UNAVAILABLE;
2916 				goto give_up;
2917 			}
2918 			if (e->e_deliver_by > 0 &&
2919 			    e->e_deliver_by - (curtime() - e->e_ctime) <
2920 			    mci->mci_min_by)
2921 			{
2922 				e->e_status = "5.4.7";
2923 				usrerrenh(e->e_status,
2924 					  "554 Message can't be delivered in time; %ld < %ld",
2925 					  e->e_deliver_by - (curtime() - e->e_ctime),
2926 					  mci->mci_min_by);
2927 				rcode = EX_UNAVAILABLE;
2928 				goto give_up;
2929 			}
2930 		}
2931 
2932 # if STARTTLS
2933 		/* first TLS then AUTH to provide a security layer */
2934 		if (mci->mci_state != MCIS_CLOSED &&
2935 		    !DONE_STARTTLS(mci->mci_flags))
2936 		{
2937 			int olderrors;
2938 			bool usetls;
2939 			bool saveQuickAbort = QuickAbort;
2940 			bool saveSuprErrs = SuprErrs;
2941 			char *host = NULL;
2942 
2943 			rcode = EX_OK;
2944 			usetls = bitset(MCIF_TLS, mci->mci_flags);
2945 			if (usetls)
2946 				usetls = !iscltflgset(e, D_NOTLS);
2947 
2948 			if (usetls)
2949 			{
2950 				host = macvalue(macid("{server_name}"), e);
2951 				olderrors = Errors;
2952 				QuickAbort = false;
2953 				SuprErrs = true;
2954 				if (rscheck("try_tls", host, NULL, e,
2955 					    RSF_RMCOMM, 7, host, NOQID) != EX_OK
2956 				    || Errors > olderrors)
2957 					usetls = false;
2958 				SuprErrs = saveSuprErrs;
2959 				QuickAbort = saveQuickAbort;
2960 			}
2961 
2962 			if (usetls)
2963 			{
2964 				if ((rcode = starttls(m, mci, e)) == EX_OK)
2965 				{
2966 					/* start again without STARTTLS */
2967 					mci->mci_flags |= MCIF_TLSACT;
2968 				}
2969 				else
2970 				{
2971 					char *s;
2972 
2973 					/*
2974 					**  TLS negotation failed, what to do?
2975 					**  fall back to unencrypted connection
2976 					**  or abort? How to decide?
2977 					**  set a macro and call a ruleset.
2978 					*/
2979 
2980 					mci->mci_flags &= ~MCIF_TLS;
2981 					switch (rcode)
2982 					{
2983 					  case EX_TEMPFAIL:
2984 						s = "TEMP";
2985 						break;
2986 					  case EX_USAGE:
2987 						s = "USAGE";
2988 						break;
2989 					  case EX_PROTOCOL:
2990 						s = "PROTOCOL";
2991 						break;
2992 					  case EX_SOFTWARE:
2993 						s = "SOFTWARE";
2994 						break;
2995 
2996 					  /* everything else is a failure */
2997 					  default:
2998 						s = "FAILURE";
2999 						rcode = EX_TEMPFAIL;
3000 					}
3001 					macdefine(&e->e_macro, A_PERM,
3002 						  macid("{verify}"), s);
3003 				}
3004 			}
3005 			else
3006 				macdefine(&e->e_macro, A_PERM,
3007 					  macid("{verify}"), "NONE");
3008 			olderrors = Errors;
3009 			QuickAbort = false;
3010 			SuprErrs = true;
3011 
3012 			/*
3013 			**  rcode == EX_SOFTWARE is special:
3014 			**  the TLS negotation failed
3015 			**  we have to drop the connection no matter what
3016 			**  However, we call tls_server to give it the chance
3017 			**  to log the problem and return an appropriate
3018 			**  error code.
3019 			*/
3020 
3021 			if (rscheck("tls_server",
3022 				    macvalue(macid("{verify}"), e),
3023 				    NULL, e, RSF_RMCOMM|RSF_COUNT, 5,
3024 				    host, NOQID) != EX_OK ||
3025 			    Errors > olderrors ||
3026 			    rcode == EX_SOFTWARE)
3027 			{
3028 				char enhsc[ENHSCLEN];
3029 				extern char MsgBuf[];
3030 
3031 				if (ISSMTPCODE(MsgBuf) &&
3032 				    extenhsc(MsgBuf + 4, ' ', enhsc) > 0)
3033 				{
3034 					p = sm_rpool_strdup_x(e->e_rpool,
3035 							      MsgBuf);
3036 				}
3037 				else
3038 				{
3039 					p = "403 4.7.0 server not authenticated.";
3040 					(void) sm_strlcpy(enhsc, "4.7.0",
3041 							  sizeof enhsc);
3042 				}
3043 				SuprErrs = saveSuprErrs;
3044 				QuickAbort = saveQuickAbort;
3045 
3046 				if (rcode == EX_SOFTWARE)
3047 				{
3048 					/* drop the connection */
3049 					mci->mci_state = MCIS_QUITING;
3050 					if (mci->mci_in != NULL)
3051 					{
3052 						(void) sm_io_close(mci->mci_in,
3053 								   SM_TIME_DEFAULT);
3054 						mci->mci_in = NULL;
3055 					}
3056 					mci->mci_flags &= ~MCIF_TLSACT;
3057 					(void) endmailer(mci, e, pv);
3058 				}
3059 				else
3060 				{
3061 					/* abort transfer */
3062 					smtpquit(m, mci, e);
3063 				}
3064 
3065 				/* avoid bogus error msg */
3066 				mci->mci_errno = 0;
3067 
3068 				/* temp or permanent failure? */
3069 				rcode = (*p == '4') ? EX_TEMPFAIL
3070 						    : EX_UNAVAILABLE;
3071 				mci_setstat(mci, rcode, enhsc, p);
3072 
3073 				/*
3074 				**  hack to get the error message into
3075 				**  the envelope (done in giveresponse())
3076 				*/
3077 
3078 				(void) sm_strlcpy(SmtpError, p,
3079 						  sizeof SmtpError);
3080 			}
3081 			QuickAbort = saveQuickAbort;
3082 			SuprErrs = saveSuprErrs;
3083 			if (DONE_STARTTLS(mci->mci_flags) &&
3084 			    mci->mci_state != MCIS_CLOSED)
3085 			{
3086 				SET_HELO(mci->mci_flags);
3087 				mci->mci_flags &= ~MCIF_EXTENS;
3088 				goto reconnect;
3089 			}
3090 		}
3091 # endif /* STARTTLS */
3092 # if SASL
3093 		/* if other server supports authentication let's authenticate */
3094 		if (mci->mci_state != MCIS_CLOSED &&
3095 		    mci->mci_saslcap != NULL &&
3096 		    !DONE_AUTH(mci->mci_flags) && !iscltflgset(e, D_NOAUTH))
3097 		{
3098 			/* Should we require some minimum authentication? */
3099 			if ((ret = smtpauth(m, mci, e)) == EX_OK)
3100 			{
3101 				int result;
3102 				sasl_ssf_t *ssf = NULL;
3103 
3104 				/* Get security strength (features) */
3105 				result = sasl_getprop(mci->mci_conn, SASL_SSF,
3106 # if SASL >= 20000
3107 						      (const void **) &ssf);
3108 # else /* SASL >= 20000 */
3109 						      (void **) &ssf);
3110 # endif /* SASL >= 20000 */
3111 
3112 				/* XXX authid? */
3113 				if (LogLevel > 9)
3114 					sm_syslog(LOG_INFO, NOQID,
3115 						  "AUTH=client, relay=%.100s, mech=%.16s, bits=%d",
3116 						  mci->mci_host,
3117 						  macvalue(macid("{auth_type}"), e),
3118 						  result == SASL_OK ? *ssf : 0);
3119 
3120 				/*
3121 				**  Only switch to encrypted connection
3122 				**  if a security layer has been negotiated
3123 				*/
3124 
3125 				if (result == SASL_OK && *ssf > 0)
3126 				{
3127 					/*
3128 					**  Convert I/O layer to use SASL.
3129 					**  If the call fails, the connection
3130 					**  is aborted.
3131 					*/
3132 
3133 					if (sfdcsasl(&mci->mci_in,
3134 						     &mci->mci_out,
3135 						     mci->mci_conn) == 0)
3136 					{
3137 						mci->mci_flags &= ~MCIF_EXTENS;
3138 						mci->mci_flags |= MCIF_AUTHACT|
3139 								  MCIF_ONLY_EHLO;
3140 						goto reconnect;
3141 					}
3142 					syserr("AUTH TLS switch failed in client");
3143 				}
3144 				/* else? XXX */
3145 				mci->mci_flags |= MCIF_AUTHACT;
3146 
3147 			}
3148 			else if (ret == EX_TEMPFAIL)
3149 			{
3150 				if (LogLevel > 8)
3151 					sm_syslog(LOG_ERR, NOQID,
3152 						  "AUTH=client, relay=%.100s, temporary failure, connection abort",
3153 						  mci->mci_host);
3154 				smtpquit(m, mci, e);
3155 
3156 				/* avoid bogus error msg */
3157 				mci->mci_errno = 0;
3158 				rcode = EX_TEMPFAIL;
3159 				mci_setstat(mci, rcode, "4.3.0", p);
3160 
3161 				/*
3162 				**  hack to get the error message into
3163 				**  the envelope (done in giveresponse())
3164 				*/
3165 
3166 				(void) sm_strlcpy(SmtpError,
3167 						  "Temporary AUTH failure",
3168 						  sizeof SmtpError);
3169 			}
3170 		}
3171 # endif /* SASL */
3172 	}
3173 
3174 
3175 do_transfer:
3176 	/* clear out per-message flags from connection structure */
3177 	mci->mci_flags &= ~(MCIF_CVT7TO8|MCIF_CVT8TO7);
3178 
3179 	if (bitset(EF_HAS8BIT, e->e_flags) &&
3180 	    !bitset(EF_DONT_MIME, e->e_flags) &&
3181 	    bitnset(M_7BITS, m->m_flags))
3182 		mci->mci_flags |= MCIF_CVT8TO7;
3183 
3184 #if MIME7TO8
3185 	if (bitnset(M_MAKE8BIT, m->m_flags) &&
3186 	    !bitset(MCIF_7BIT, mci->mci_flags) &&
3187 	    (p = hvalue("Content-Transfer-Encoding", e->e_header)) != NULL &&
3188 	     (sm_strcasecmp(p, "quoted-printable") == 0 ||
3189 	      sm_strcasecmp(p, "base64") == 0) &&
3190 	    (p = hvalue("Content-Type", e->e_header)) != NULL)
3191 	{
3192 		/* may want to convert 7 -> 8 */
3193 		/* XXX should really parse it here -- and use a class XXX */
3194 		if (sm_strncasecmp(p, "text/plain", 10) == 0 &&
3195 		    (p[10] == '\0' || p[10] == ' ' || p[10] == ';'))
3196 			mci->mci_flags |= MCIF_CVT7TO8;
3197 	}
3198 #endif /* MIME7TO8 */
3199 
3200 	if (tTd(11, 1))
3201 	{
3202 		sm_dprintf("openmailer: ");
3203 		mci_dump(sm_debug_file(), mci, false);
3204 	}
3205 
3206 #if _FFR_CLIENT_SIZE
3207 	/*
3208 	**  See if we know the maximum size and
3209 	**  abort if the message is too big.
3210 	**
3211 	**  NOTE: _FFR_CLIENT_SIZE is untested.
3212 	*/
3213 
3214 	if (bitset(MCIF_SIZE, mci->mci_flags) &&
3215 	    mci->mci_maxsize > 0 &&
3216 	    e->e_msgsize > mci->mci_maxsize)
3217 	{
3218 		e->e_flags |= EF_NO_BODY_RETN;
3219 		if (bitnset(M_LOCALMAILER, m->m_flags))
3220 			e->e_status = "5.2.3";
3221 		else
3222 			e->e_status = "5.3.4";
3223 
3224 		usrerrenh(e->e_status,
3225 			  "552 Message is too large; %ld bytes max",
3226 			  mci->mci_maxsize);
3227 		rcode = EX_DATAERR;
3228 
3229 		/* Need an e_message for error */
3230 		(void) sm_snprintf(SmtpError, sizeof SmtpError,
3231 				   "Message is too large; %ld bytes max",
3232 				   mci->mci_maxsize);
3233 		goto give_up;
3234 	}
3235 #endif /* _FFR_CLIENT_SIZE */
3236 
3237 	if (mci->mci_state != MCIS_OPEN)
3238 	{
3239 		/* couldn't open the mailer */
3240 		rcode = mci->mci_exitstat;
3241 		errno = mci->mci_errno;
3242 		SM_SET_H_ERRNO(mci->mci_herrno);
3243 		if (rcode == EX_OK)
3244 		{
3245 			/* shouldn't happen */
3246 			syserr("554 5.3.5 deliver: mci=%lx rcode=%d errno=%d state=%d sig=%s",
3247 			       (unsigned long) mci, rcode, errno,
3248 			       mci->mci_state, firstsig);
3249 			mci_dump_all(smioout, true);
3250 			rcode = EX_SOFTWARE;
3251 		}
3252 		else if (nummxhosts > hostnum)
3253 		{
3254 			/* try next MX site */
3255 			goto tryhost;
3256 		}
3257 	}
3258 	else if (!clever)
3259 	{
3260 		/*
3261 		**  Format and send message.
3262 		*/
3263 
3264 		putfromline(mci, e);
3265 		(*e->e_puthdr)(mci, e->e_header, e, M87F_OUTER);
3266 		(*e->e_putbody)(mci, e, NULL);
3267 
3268 		/* get the exit status */
3269 		rcode = endmailer(mci, e, pv);
3270 		if (rcode == EX_TEMPFAIL && SmtpError[0] == '\0')
3271 		{
3272 			/*
3273 			**  Need an e_message for mailq display.
3274 			**  We set SmtpError as
3275 			*/
3276 
3277 			(void) sm_snprintf(SmtpError, sizeof SmtpError,
3278 					   "%s mailer (%s) exited with EX_TEMPFAIL",
3279 					   m->m_name, m->m_mailer);
3280 		}
3281 	}
3282 	else
3283 	{
3284 		/*
3285 		**  Send the MAIL FROM: protocol
3286 		*/
3287 
3288 		/* XXX this isn't pipelined... */
3289 		rcode = smtpmailfrom(m, mci, e);
3290 		if (rcode == EX_OK)
3291 		{
3292 			register int i;
3293 # if PIPELINING
3294 			ADDRESS *volatile pchain;
3295 # endif /* PIPELINING */
3296 
3297 			/* send the recipient list */
3298 			tobuf[0] = '\0';
3299 			mci->mci_retryrcpt = false;
3300 			mci->mci_tolist = tobuf;
3301 # if PIPELINING
3302 			pchain = NULL;
3303 			mci->mci_nextaddr = NULL;
3304 # endif /* PIPELINING */
3305 
3306 			for (to = tochain; to != NULL; to = to->q_tchain)
3307 			{
3308 				if (!QS_IS_UNMARKED(to->q_state))
3309 					continue;
3310 
3311 				/* mark recipient state as "ok so far" */
3312 				to->q_state = QS_OK;
3313 				e->e_to = to->q_paddr;
3314 # if STARTTLS
3315 				i = rscheck("tls_rcpt", to->q_user, NULL, e,
3316 					    RSF_RMCOMM|RSF_COUNT, 3,
3317 					    mci->mci_host, e->e_id);
3318 				if (i != EX_OK)
3319 				{
3320 					markfailure(e, to, mci, i, false);
3321 					giveresponse(i, to->q_status,  m, mci,
3322 						     ctladdr, xstart, e, to);
3323 					if (i == EX_TEMPFAIL)
3324 					{
3325 						mci->mci_retryrcpt = true;
3326 						to->q_state = QS_RETRY;
3327 					}
3328 					continue;
3329 				}
3330 # endif /* STARTTLS */
3331 
3332 				i = smtprcpt(to, m, mci, e, ctladdr, xstart);
3333 # if PIPELINING
3334 				if (i == EX_OK &&
3335 				    bitset(MCIF_PIPELINED, mci->mci_flags))
3336 				{
3337 					/*
3338 					**  Add new element to list of
3339 					**  recipients for pipelining.
3340 					*/
3341 
3342 					to->q_pchain = NULL;
3343 					if (mci->mci_nextaddr == NULL)
3344 						mci->mci_nextaddr = to;
3345 					if (pchain == NULL)
3346 						pchain = to;
3347 					else
3348 					{
3349 						pchain->q_pchain = to;
3350 						pchain = pchain->q_pchain;
3351 					}
3352 				}
3353 # endif /* PIPELINING */
3354 				if (i != EX_OK)
3355 				{
3356 					markfailure(e, to, mci, i, false);
3357 					giveresponse(i, to->q_status, m, mci,
3358 						     ctladdr, xstart, e, to);
3359 					if (i == EX_TEMPFAIL)
3360 						to->q_state = QS_RETRY;
3361 				}
3362 			}
3363 
3364 			/* No recipients in list and no missing responses? */
3365 			if (tobuf[0] == '\0'
3366 # if PIPELINING
3367 			    && mci->mci_nextaddr == NULL
3368 # endif /* PIPELINING */
3369 			   )
3370 			{
3371 				rcode = EX_OK;
3372 				e->e_to = NULL;
3373 				if (bitset(MCIF_CACHED, mci->mci_flags))
3374 					smtprset(m, mci, e);
3375 			}
3376 			else
3377 			{
3378 				e->e_to = tobuf + 1;
3379 				rcode = smtpdata(m, mci, e, ctladdr, xstart);
3380 			}
3381 		}
3382 		if (rcode == EX_TEMPFAIL && nummxhosts > hostnum)
3383 		{
3384 			/* try next MX site */
3385 			goto tryhost;
3386 		}
3387 	}
3388 #if NAMED_BIND
3389 	if (ConfigLevel < 2)
3390 		_res.options |= RES_DEFNAMES | RES_DNSRCH;	/* XXX */
3391 #endif /* NAMED_BIND */
3392 
3393 	if (tTd(62, 1))
3394 		checkfds("after delivery");
3395 
3396 	/*
3397 	**  Do final status disposal.
3398 	**	We check for something in tobuf for the SMTP case.
3399 	**	If we got a temporary failure, arrange to queue the
3400 	**		addressees.
3401 	*/
3402 
3403   give_up:
3404 	if (bitnset(M_LMTP, m->m_flags))
3405 	{
3406 		lmtp_rcode = rcode;
3407 		tobuf[0] = '\0';
3408 		anyok = false;
3409 		strsize = 0;
3410 	}
3411 	else
3412 		anyok = rcode == EX_OK;
3413 
3414 	for (to = tochain; to != NULL; to = to->q_tchain)
3415 	{
3416 		/* see if address already marked */
3417 		if (!QS_IS_OK(to->q_state))
3418 			continue;
3419 
3420 		/* if running LMTP, get the status for each address */
3421 		if (bitnset(M_LMTP, m->m_flags))
3422 		{
3423 			if (lmtp_rcode == EX_OK)
3424 				rcode = smtpgetstat(m, mci, e);
3425 			if (rcode == EX_OK)
3426 			{
3427 				strsize += sm_strlcat2(tobuf + strsize, ",",
3428 						to->q_paddr,
3429 						tobufsize - strsize);
3430 				SM_ASSERT(strsize < tobufsize);
3431 				anyok = true;
3432 			}
3433 			else
3434 			{
3435 				e->e_to = to->q_paddr;
3436 				markfailure(e, to, mci, rcode, true);
3437 				giveresponse(rcode, to->q_status, m, mci,
3438 					     ctladdr, xstart, e, to);
3439 				e->e_to = tobuf + 1;
3440 				continue;
3441 			}
3442 		}
3443 		else
3444 		{
3445 			/* mark bad addresses */
3446 			if (rcode != EX_OK)
3447 			{
3448 				if (goodmxfound && rcode == EX_NOHOST)
3449 					rcode = EX_TEMPFAIL;
3450 				markfailure(e, to, mci, rcode, true);
3451 				continue;
3452 			}
3453 		}
3454 
3455 		/* successful delivery */
3456 		to->q_state = QS_SENT;
3457 		to->q_statdate = curtime();
3458 		e->e_nsent++;
3459 
3460 		/*
3461 		**  Checkpoint the send list every few addresses
3462 		*/
3463 
3464 		if (CheckpointInterval > 0 && e->e_nsent >= CheckpointInterval)
3465 		{
3466 			queueup(e, false, false);
3467 			e->e_nsent = 0;
3468 		}
3469 
3470 		if (bitnset(M_LOCALMAILER, m->m_flags) &&
3471 		    bitset(QPINGONSUCCESS, to->q_flags))
3472 		{
3473 			to->q_flags |= QDELIVERED;
3474 			to->q_status = "2.1.5";
3475 			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3476 					     "%s... Successfully delivered\n",
3477 					     to->q_paddr);
3478 		}
3479 		else if (bitset(QPINGONSUCCESS, to->q_flags) &&
3480 			 bitset(QPRIMARY, to->q_flags) &&
3481 			 !bitset(MCIF_DSN, mci->mci_flags))
3482 		{
3483 			to->q_flags |= QRELAYED;
3484 			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3485 					     "%s... relayed; expect no further notifications\n",
3486 					     to->q_paddr);
3487 		}
3488 		else if (IS_DLVR_NOTIFY(e) &&
3489 			 !bitset(MCIF_DLVR_BY, mci->mci_flags) &&
3490 			 bitset(QPRIMARY, to->q_flags) &&
3491 			 (!bitset(QHASNOTIFY, to->q_flags) ||
3492 			  bitset(QPINGONSUCCESS, to->q_flags) ||
3493 			  bitset(QPINGONFAILURE, to->q_flags) ||
3494 			  bitset(QPINGONDELAY, to->q_flags)))
3495 		{
3496 			/* RFC 2852, 4.1.4.2: no NOTIFY, or not NEVER */
3497 			to->q_flags |= QBYNRELAY;
3498 			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3499 					     "%s... Deliver-by notify: relayed\n",
3500 					     to->q_paddr);
3501 		}
3502 		else if (IS_DLVR_TRACE(e) &&
3503 			 (!bitset(QHASNOTIFY, to->q_flags) ||
3504 			  bitset(QPINGONSUCCESS, to->q_flags) ||
3505 			  bitset(QPINGONFAILURE, to->q_flags) ||
3506 			  bitset(QPINGONDELAY, to->q_flags)) &&
3507 			 bitset(QPRIMARY, to->q_flags))
3508 		{
3509 			/* RFC 2852, 4.1.4: no NOTIFY, or not NEVER */
3510 			to->q_flags |= QBYTRACE;
3511 			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT,
3512 					     "%s... Deliver-By trace: relayed\n",
3513 					     to->q_paddr);
3514 		}
3515 	}
3516 
3517 	if (bitnset(M_LMTP, m->m_flags))
3518 	{
3519 		/*
3520 		**  Global information applies to the last recipient only;
3521 		**  clear it out to avoid bogus errors.
3522 		*/
3523 
3524 		rcode = EX_OK;
3525 		e->e_statmsg = NULL;
3526 
3527 		/* reset the mci state for the next transaction */
3528 		if (mci != NULL &&
3529 		    (mci->mci_state == MCIS_MAIL ||
3530 		     mci->mci_state == MCIS_RCPT ||
3531 		     mci->mci_state == MCIS_DATA))
3532 		{
3533 			mci->mci_state = MCIS_OPEN;
3534 			SmtpPhase = mci->mci_phase = "idle";
3535 			sm_setproctitle(true, e, "%s: %s", CurHostName,
3536 					mci->mci_phase);
3537 		}
3538 	}
3539 
3540 	if (tobuf[0] != '\0')
3541 	{
3542 		giveresponse(rcode, NULL, m, mci, ctladdr, xstart, e, tochain);
3543 #if 0
3544 		/*
3545 		**  This code is disabled for now because I am not
3546 		**  sure that copying status from the first recipient
3547 		**  to all non-status'ed recipients is a good idea.
3548 		*/
3549 
3550 		if (tochain->q_message != NULL &&
3551 		    !bitnset(M_LMTP, m->m_flags) && rcode != EX_OK)
3552 		{
3553 			for (to = tochain->q_tchain; to != NULL;
3554 			     to = to->q_tchain)
3555 			{
3556 				/* see if address already marked */
3557 				if (QS_IS_QUEUEUP(to->q_state) &&
3558 				    to->q_message == NULL)
3559 					to->q_message = sm_rpool_strdup_x(e->e_rpool,
3560 							tochain->q_message);
3561 			}
3562 		}
3563 #endif /* 0 */
3564 	}
3565 	if (anyok)
3566 		markstats(e, tochain, STATS_NORMAL);
3567 	mci_store_persistent(mci);
3568 
3569 	/* Some recipients were tempfailed, try them on the next host */
3570 	if (mci != NULL && mci->mci_retryrcpt && nummxhosts > hostnum)
3571 	{
3572 		/* try next MX site */
3573 		goto tryhost;
3574 	}
3575 
3576 	/* now close the connection */
3577 	if (clever && mci != NULL && mci->mci_state != MCIS_CLOSED &&
3578 	    !bitset(MCIF_CACHED, mci->mci_flags))
3579 		smtpquit(m, mci, e);
3580 
3581 cleanup: ;
3582 	}
3583 	SM_FINALLY
3584 	{
3585 		/*
3586 		**  Restore state and return.
3587 		*/
3588 #if XDEBUG
3589 		char wbuf[MAXLINE];
3590 
3591 		/* make absolutely certain 0, 1, and 2 are in use */
3592 		(void) sm_snprintf(wbuf, sizeof wbuf,
3593 				   "%s... end of deliver(%s)",
3594 				   e->e_to == NULL ? "NO-TO-LIST"
3595 						   : shortenstring(e->e_to,
3596 								   MAXSHORTSTR),
3597 				  m->m_name);
3598 		checkfd012(wbuf);
3599 #endif /* XDEBUG */
3600 
3601 		errno = 0;
3602 
3603 		/*
3604 		**  It was originally necessary to set macro 'g' to NULL
3605 		**  because it previously pointed to an auto buffer.
3606 		**  We don't do this any more, so this may be unnecessary.
3607 		*/
3608 
3609 		macdefine(&e->e_macro, A_PERM, 'g', (char *) NULL);
3610 		e->e_to = NULL;
3611 	}
3612 	SM_END_TRY
3613 	return rcode;
3614 }
3615 
3616 /*
3617 **  MARKFAILURE -- mark a failure on a specific address.
3618 **
3619 **	Parameters:
3620 **		e -- the envelope we are sending.
3621 **		q -- the address to mark.
3622 **		mci -- mailer connection information.
3623 **		rcode -- the code signifying the particular failure.
3624 **		ovr -- override an existing code?
3625 **
3626 **	Returns:
3627 **		none.
3628 **
3629 **	Side Effects:
3630 **		marks the address (and possibly the envelope) with the
3631 **			failure so that an error will be returned or
3632 **			the message will be queued, as appropriate.
3633 */
3634 
3635 void
3636 markfailure(e, q, mci, rcode, ovr)
3637 	register ENVELOPE *e;
3638 	register ADDRESS *q;
3639 	register MCI *mci;
3640 	int rcode;
3641 	bool ovr;
3642 {
3643 	int save_errno = errno;
3644 	char *status = NULL;
3645 	char *rstatus = NULL;
3646 
3647 	switch (rcode)
3648 	{
3649 	  case EX_OK:
3650 		break;
3651 
3652 	  case EX_TEMPFAIL:
3653 	  case EX_IOERR:
3654 	  case EX_OSERR:
3655 		q->q_state = QS_QUEUEUP;
3656 		break;
3657 
3658 	  default:
3659 		q->q_state = QS_BADADDR;
3660 		break;
3661 	}
3662 
3663 	/* find most specific error code possible */
3664 	if (mci != NULL && mci->mci_status != NULL)
3665 	{
3666 		status = sm_rpool_strdup_x(e->e_rpool, mci->mci_status);
3667 		if (mci->mci_rstatus != NULL)
3668 			rstatus = sm_rpool_strdup_x(e->e_rpool,
3669 						    mci->mci_rstatus);
3670 		else
3671 			rstatus = NULL;
3672 	}
3673 	else if (e->e_status != NULL)
3674 	{
3675 		status = e->e_status;
3676 		rstatus = NULL;
3677 	}
3678 	else
3679 	{
3680 		switch (rcode)
3681 		{
3682 		  case EX_USAGE:
3683 			status = "5.5.4";
3684 			break;
3685 
3686 		  case EX_DATAERR:
3687 			status = "5.5.2";
3688 			break;
3689 
3690 		  case EX_NOUSER:
3691 			status = "5.1.1";
3692 			break;
3693 
3694 		  case EX_NOHOST:
3695 			status = "5.1.2";
3696 			break;
3697 
3698 		  case EX_NOINPUT:
3699 		  case EX_CANTCREAT:
3700 		  case EX_NOPERM:
3701 			status = "5.3.0";
3702 			break;
3703 
3704 		  case EX_UNAVAILABLE:
3705 		  case EX_SOFTWARE:
3706 		  case EX_OSFILE:
3707 		  case EX_PROTOCOL:
3708 		  case EX_CONFIG:
3709 			status = "5.5.0";
3710 			break;
3711 
3712 		  case EX_OSERR:
3713 		  case EX_IOERR:
3714 			status = "4.5.0";
3715 			break;
3716 
3717 		  case EX_TEMPFAIL:
3718 			status = "4.2.0";
3719 			break;
3720 		}
3721 	}
3722 
3723 	/* new status? */
3724 	if (status != NULL && *status != '\0' && (ovr || q->q_status == NULL ||
3725 	    *q->q_status == '\0' || *q->q_status < *status))
3726 	{
3727 		q->q_status = status;
3728 		q->q_rstatus = rstatus;
3729 	}
3730 	if (rcode != EX_OK && q->q_rstatus == NULL &&
3731 	    q->q_mailer != NULL && q->q_mailer->m_diagtype != NULL &&
3732 	    sm_strcasecmp(q->q_mailer->m_diagtype, "X-UNIX") == 0)
3733 	{
3734 		char buf[16];
3735 
3736 		(void) sm_snprintf(buf, sizeof buf, "%d", rcode);
3737 		q->q_rstatus = sm_rpool_strdup_x(e->e_rpool, buf);
3738 	}
3739 
3740 	q->q_statdate = curtime();
3741 	if (CurHostName != NULL && CurHostName[0] != '\0' &&
3742 	    mci != NULL && !bitset(M_LOCALMAILER, mci->mci_flags))
3743 		q->q_statmta = sm_rpool_strdup_x(e->e_rpool, CurHostName);
3744 
3745 	/* restore errno */
3746 	errno = save_errno;
3747 }
3748 /*
3749 **  ENDMAILER -- Wait for mailer to terminate.
3750 **
3751 **	We should never get fatal errors (e.g., segmentation
3752 **	violation), so we report those specially.  For other
3753 **	errors, we choose a status message (into statmsg),
3754 **	and if it represents an error, we print it.
3755 **
3756 **	Parameters:
3757 **		mci -- the mailer connection info.
3758 **		e -- the current envelope.
3759 **		pv -- the parameter vector that invoked the mailer
3760 **			(for error messages).
3761 **
3762 **	Returns:
3763 **		exit code of mailer.
3764 **
3765 **	Side Effects:
3766 **		none.
3767 */
3768 
3769 static jmp_buf	EndWaitTimeout;
3770 
3771 static void
3772 endwaittimeout(ignore)
3773 	int ignore;
3774 {
3775 	/*
3776 	**  NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
3777 	**	ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
3778 	**	DOING.
3779 	*/
3780 
3781 	errno = ETIMEDOUT;
3782 	longjmp(EndWaitTimeout, 1);
3783 }
3784 
3785 int
3786 endmailer(mci, e, pv)
3787 	register MCI *mci;
3788 	register ENVELOPE *e;
3789 	char **pv;
3790 {
3791 	int st;
3792 	int save_errno = errno;
3793 	char buf[MAXLINE];
3794 	SM_EVENT *ev = NULL;
3795 
3796 
3797 	mci_unlock_host(mci);
3798 
3799 	/* close output to mailer */
3800 	if (mci->mci_out != NULL)
3801 	{
3802 		(void) sm_io_close(mci->mci_out, SM_TIME_DEFAULT);
3803 		mci->mci_out = NULL;
3804 	}
3805 
3806 	/* copy any remaining input to transcript */
3807 	if (mci->mci_in != NULL && mci->mci_state != MCIS_ERROR &&
3808 	    e->e_xfp != NULL)
3809 	{
3810 		while (sfgets(buf, sizeof buf, mci->mci_in,
3811 			      TimeOuts.to_quit, "Draining Input") != NULL)
3812 			(void) sm_io_fputs(e->e_xfp, SM_TIME_DEFAULT, buf);
3813 	}
3814 
3815 #if SASL
3816 	/* close SASL connection */
3817 	if (bitset(MCIF_AUTHACT, mci->mci_flags))
3818 	{
3819 		sasl_dispose(&mci->mci_conn);
3820 		mci->mci_flags &= ~MCIF_AUTHACT;
3821 	}
3822 #endif /* SASL */
3823 
3824 #if STARTTLS
3825 	/* shutdown TLS */
3826 	(void) endtlsclt(mci);
3827 #endif /* STARTTLS */
3828 
3829 	/* now close the input */
3830 	if (mci->mci_in != NULL)
3831 	{
3832 		(void) sm_io_close(mci->mci_in, SM_TIME_DEFAULT);
3833 		mci->mci_in = NULL;
3834 	}
3835 	mci->mci_state = MCIS_CLOSED;
3836 
3837 	errno = save_errno;
3838 
3839 	/* in the IPC case there is nothing to wait for */
3840 	if (mci->mci_pid == 0)
3841 		return EX_OK;
3842 
3843 	/* put a timeout around the wait */
3844 	if (mci->mci_mailer->m_wait > 0)
3845 	{
3846 		if (setjmp(EndWaitTimeout) == 0)
3847 			ev = sm_setevent(mci->mci_mailer->m_wait,
3848 					 endwaittimeout, 0);
3849 		else
3850 		{
3851 			syserr("endmailer %s: wait timeout (%ld)",
3852 			       mci->mci_mailer->m_name,
3853 			       (long) mci->mci_mailer->m_wait);
3854 			return EX_TEMPFAIL;
3855 		}
3856 	}
3857 
3858 	/* wait for the mailer process, collect status */
3859 	st = waitfor(mci->mci_pid);
3860 	save_errno = errno;
3861 	if (ev != NULL)
3862 		sm_clrevent(ev);
3863 	errno = save_errno;
3864 
3865 	if (st == -1)
3866 	{
3867 		syserr("endmailer %s: wait", mci->mci_mailer->m_name);
3868 		return EX_SOFTWARE;
3869 	}
3870 
3871 	if (WIFEXITED(st))
3872 	{
3873 		/* normal death -- return status */
3874 		return (WEXITSTATUS(st));
3875 	}
3876 
3877 	/* it died a horrid death */
3878 	syserr("451 4.3.0 mailer %s died with signal %d%s",
3879 		mci->mci_mailer->m_name, WTERMSIG(st),
3880 		WCOREDUMP(st) ? " (core dumped)" :
3881 		(WIFSTOPPED(st) ? " (stopped)" : ""));
3882 
3883 	/* log the arguments */
3884 	if (pv != NULL && e->e_xfp != NULL)
3885 	{
3886 		register char **av;
3887 
3888 		(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, "Arguments:");
3889 		for (av = pv; *av != NULL; av++)
3890 			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, " %s",
3891 					     *av);
3892 		(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, "\n");
3893 	}
3894 
3895 	ExitStat = EX_TEMPFAIL;
3896 	return EX_TEMPFAIL;
3897 }
3898 /*
3899 **  GIVERESPONSE -- Interpret an error response from a mailer
3900 **
3901 **	Parameters:
3902 **		status -- the status code from the mailer (high byte
3903 **			only; core dumps must have been taken care of
3904 **			already).
3905 **		dsn -- the DSN associated with the address, if any.
3906 **		m -- the mailer info for this mailer.
3907 **		mci -- the mailer connection info -- can be NULL if the
3908 **			response is given before the connection is made.
3909 **		ctladdr -- the controlling address for the recipient
3910 **			address(es).
3911 **		xstart -- the transaction start time, for computing
3912 **			transaction delays.
3913 **		e -- the current envelope.
3914 **		to -- the current recipient (NULL if none).
3915 **
3916 **	Returns:
3917 **		none.
3918 **
3919 **	Side Effects:
3920 **		Errors may be incremented.
3921 **		ExitStat may be set.
3922 */
3923 
3924 void
3925 giveresponse(status, dsn, m, mci, ctladdr, xstart, e, to)
3926 	int status;
3927 	char *dsn;
3928 	register MAILER *m;
3929 	register MCI *mci;
3930 	ADDRESS *ctladdr;
3931 	time_t xstart;
3932 	ENVELOPE *e;
3933 	ADDRESS *to;
3934 {
3935 	register const char *statmsg;
3936 	int errnum = errno;
3937 	int off = 4;
3938 	bool usestat = false;
3939 	char dsnbuf[ENHSCLEN];
3940 	char buf[MAXLINE];
3941 	char *exmsg;
3942 
3943 	if (e == NULL)
3944 		syserr("giveresponse: null envelope");
3945 
3946 	/*
3947 	**  Compute status message from code.
3948 	*/
3949 
3950 	exmsg = sm_sysexmsg(status);
3951 	if (status == 0)
3952 	{
3953 		statmsg = "250 2.0.0 Sent";
3954 		if (e->e_statmsg != NULL)
3955 		{
3956 			(void) sm_snprintf(buf, sizeof buf, "%s (%s)",
3957 					   statmsg,
3958 					   shortenstring(e->e_statmsg, 403));
3959 			statmsg = buf;
3960 		}
3961 	}
3962 	else if (exmsg == NULL)
3963 	{
3964 		(void) sm_snprintf(buf, sizeof buf,
3965 				   "554 5.3.0 unknown mailer error %d",
3966 				   status);
3967 		status = EX_UNAVAILABLE;
3968 		statmsg = buf;
3969 		usestat = true;
3970 	}
3971 	else if (status == EX_TEMPFAIL)
3972 	{
3973 		char *bp = buf;
3974 
3975 		(void) sm_strlcpy(bp, exmsg + 1, SPACELEFT(buf, bp));
3976 		bp += strlen(bp);
3977 #if NAMED_BIND
3978 		if (h_errno == TRY_AGAIN)
3979 			statmsg = sm_errstring(h_errno + E_DNSBASE);
3980 		else
3981 #endif /* NAMED_BIND */
3982 		{
3983 			if (errnum != 0)
3984 				statmsg = sm_errstring(errnum);
3985 			else
3986 				statmsg = SmtpError;
3987 		}
3988 		if (statmsg != NULL && statmsg[0] != '\0')
3989 		{
3990 			switch (errnum)
3991 			{
3992 #ifdef ENETDOWN
3993 			  case ENETDOWN:	/* Network is down */
3994 #endif /* ENETDOWN */
3995 #ifdef ENETUNREACH
3996 			  case ENETUNREACH:	/* Network is unreachable */
3997 #endif /* ENETUNREACH */
3998 #ifdef ENETRESET
3999 			  case ENETRESET:	/* Network dropped connection on reset */
4000 #endif /* ENETRESET */
4001 #ifdef ECONNABORTED
4002 			  case ECONNABORTED:	/* Software caused connection abort */
4003 #endif /* ECONNABORTED */
4004 #ifdef EHOSTDOWN
4005 			  case EHOSTDOWN:	/* Host is down */
4006 #endif /* EHOSTDOWN */
4007 #ifdef EHOSTUNREACH
4008 			  case EHOSTUNREACH:	/* No route to host */
4009 #endif /* EHOSTUNREACH */
4010 				if (mci != NULL && mci->mci_host != NULL)
4011 				{
4012 					(void) sm_strlcpyn(bp,
4013 							   SPACELEFT(buf, bp),
4014 							   2, ": ",
4015 							   mci->mci_host);
4016 					bp += strlen(bp);
4017 				}
4018 				break;
4019 			}
4020 			(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ": ",
4021 					   statmsg);
4022 			usestat = true;
4023 		}
4024 		statmsg = buf;
4025 	}
4026 #if NAMED_BIND
4027 	else if (status == EX_NOHOST && h_errno != 0)
4028 	{
4029 		statmsg = sm_errstring(h_errno + E_DNSBASE);
4030 		(void) sm_snprintf(buf, sizeof buf, "%s (%s)", exmsg + 1,
4031 				   statmsg);
4032 		statmsg = buf;
4033 		usestat = true;
4034 	}
4035 #endif /* NAMED_BIND */
4036 	else
4037 	{
4038 		statmsg = exmsg;
4039 		if (*statmsg++ == ':' && errnum != 0)
4040 		{
4041 			(void) sm_snprintf(buf, sizeof buf, "%s: %s", statmsg,
4042 					   sm_errstring(errnum));
4043 			statmsg = buf;
4044 			usestat = true;
4045 		}
4046 		else if (bitnset(M_LMTP, m->m_flags) && e->e_statmsg != NULL)
4047 		{
4048 			(void) sm_snprintf(buf, sizeof buf, "%s (%s)", statmsg,
4049 					   shortenstring(e->e_statmsg, 403));
4050 			statmsg = buf;
4051 			usestat = true;
4052 		}
4053 	}
4054 
4055 	/*
4056 	**  Print the message as appropriate
4057 	*/
4058 
4059 	if (status == EX_OK || status == EX_TEMPFAIL)
4060 	{
4061 		extern char MsgBuf[];
4062 
4063 		if ((off = isenhsc(statmsg + 4, ' ')) > 0)
4064 		{
4065 			if (dsn == NULL)
4066 			{
4067 				(void) sm_snprintf(dsnbuf, sizeof dsnbuf,
4068 						   "%.*s", off, statmsg + 4);
4069 				dsn = dsnbuf;
4070 			}
4071 			off += 5;
4072 		}
4073 		else
4074 		{
4075 			off = 4;
4076 		}
4077 		message("%s", statmsg + off);
4078 		if (status == EX_TEMPFAIL && e->e_xfp != NULL)
4079 			(void) sm_io_fprintf(e->e_xfp, SM_TIME_DEFAULT, "%s\n",
4080 					     &MsgBuf[4]);
4081 	}
4082 	else
4083 	{
4084 		char mbuf[ENHSCLEN + 4];
4085 
4086 		Errors++;
4087 		if ((off = isenhsc(statmsg + 4, ' ')) > 0 &&
4088 		    off < sizeof mbuf - 4)
4089 		{
4090 			if (dsn == NULL)
4091 			{
4092 				(void) sm_snprintf(dsnbuf, sizeof dsnbuf,
4093 						   "%.*s", off, statmsg + 4);
4094 				dsn = dsnbuf;
4095 			}
4096 			off += 5;
4097 
4098 			/* copy only part of statmsg to mbuf */
4099 			(void) sm_strlcpy(mbuf, statmsg, off);
4100 			(void) sm_strlcat(mbuf, " %s", sizeof mbuf);
4101 		}
4102 		else
4103 		{
4104 			dsnbuf[0] = '\0';
4105 			(void) sm_snprintf(mbuf, sizeof mbuf, "%.3s %%s",
4106 					   statmsg);
4107 			off = 4;
4108 		}
4109 		usrerr(mbuf, &statmsg[off]);
4110 	}
4111 
4112 	/*
4113 	**  Final cleanup.
4114 	**	Log a record of the transaction.  Compute the new
4115 	**	ExitStat -- if we already had an error, stick with
4116 	**	that.
4117 	*/
4118 
4119 	if (OpMode != MD_VERIFY && !bitset(EF_VRFYONLY, e->e_flags) &&
4120 	    LogLevel > ((status == EX_TEMPFAIL) ? 8 : (status == EX_OK) ? 7 : 6))
4121 		logdelivery(m, mci, dsn, statmsg + off, ctladdr, xstart, e);
4122 
4123 	if (tTd(11, 2))
4124 		sm_dprintf("giveresponse: status=%d, dsn=%s, e->e_message=%s, errnum=%d\n",
4125 			   status,
4126 			   dsn == NULL ? "<NULL>" : dsn,
4127 			   e->e_message == NULL ? "<NULL>" : e->e_message,
4128 			   errnum);
4129 
4130 	if (status != EX_TEMPFAIL)
4131 		setstat(status);
4132 	if (status != EX_OK && (status != EX_TEMPFAIL || e->e_message == NULL))
4133 		e->e_message = sm_rpool_strdup_x(e->e_rpool, statmsg + off);
4134 	if (status != EX_OK && to != NULL && to->q_message == NULL)
4135 	{
4136 		if (!usestat && e->e_message != NULL)
4137 			to->q_message = sm_rpool_strdup_x(e->e_rpool,
4138 							  e->e_message);
4139 		else
4140 			to->q_message = sm_rpool_strdup_x(e->e_rpool,
4141 							  statmsg + off);
4142 	}
4143 	errno = 0;
4144 	SM_SET_H_ERRNO(0);
4145 }
4146 /*
4147 **  LOGDELIVERY -- log the delivery in the system log
4148 **
4149 **	Care is taken to avoid logging lines that are too long, because
4150 **	some versions of syslog have an unfortunate proclivity for core
4151 **	dumping.  This is a hack, to be sure, that is at best empirical.
4152 **
4153 **	Parameters:
4154 **		m -- the mailer info.  Can be NULL for initial queue.
4155 **		mci -- the mailer connection info -- can be NULL if the
4156 **			log is occurring when no connection is active.
4157 **		dsn -- the DSN attached to the status.
4158 **		status -- the message to print for the status.
4159 **		ctladdr -- the controlling address for the to list.
4160 **		xstart -- the transaction start time, used for
4161 **			computing transaction delay.
4162 **		e -- the current envelope.
4163 **
4164 **	Returns:
4165 **		none
4166 **
4167 **	Side Effects:
4168 **		none
4169 */
4170 
4171 void
4172 logdelivery(m, mci, dsn, status, ctladdr, xstart, e)
4173 	MAILER *m;
4174 	register MCI *mci;
4175 	char *dsn;
4176 	const char *status;
4177 	ADDRESS *ctladdr;
4178 	time_t xstart;
4179 	register ENVELOPE *e;
4180 {
4181 	register char *bp;
4182 	register char *p;
4183 	int l;
4184 	time_t now = curtime();
4185 	char buf[1024];
4186 
4187 #if (SYSLOG_BUFSIZE) >= 256
4188 	/* ctladdr: max 106 bytes */
4189 	bp = buf;
4190 	if (ctladdr != NULL)
4191 	{
4192 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", ctladdr=",
4193 				   shortenstring(ctladdr->q_paddr, 83));
4194 		bp += strlen(bp);
4195 		if (bitset(QGOODUID, ctladdr->q_flags))
4196 		{
4197 			(void) sm_snprintf(bp, SPACELEFT(buf, bp), " (%d/%d)",
4198 					   (int) ctladdr->q_uid,
4199 					   (int) ctladdr->q_gid);
4200 			bp += strlen(bp);
4201 		}
4202 	}
4203 
4204 	/* delay & xdelay: max 41 bytes */
4205 	(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", delay=",
4206 			   pintvl(now - e->e_ctime, true));
4207 	bp += strlen(bp);
4208 
4209 	if (xstart != (time_t) 0)
4210 	{
4211 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", xdelay=",
4212 				   pintvl(now - xstart, true));
4213 		bp += strlen(bp);
4214 	}
4215 
4216 	/* mailer: assume about 19 bytes (max 10 byte mailer name) */
4217 	if (m != NULL)
4218 	{
4219 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", mailer=",
4220 				   m->m_name);
4221 		bp += strlen(bp);
4222 	}
4223 
4224 	/* pri: changes with each delivery attempt */
4225 	(void) sm_snprintf(bp, SPACELEFT(buf, bp), ", pri=%ld",
4226 		e->e_msgpriority);
4227 	bp += strlen(bp);
4228 
4229 	/* relay: max 66 bytes for IPv4 addresses */
4230 	if (mci != NULL && mci->mci_host != NULL)
4231 	{
4232 		extern SOCKADDR CurHostAddr;
4233 
4234 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", relay=",
4235 				   shortenstring(mci->mci_host, 40));
4236 		bp += strlen(bp);
4237 
4238 		if (CurHostAddr.sa.sa_family != 0)
4239 		{
4240 			(void) sm_snprintf(bp, SPACELEFT(buf, bp), " [%s]",
4241 					   anynet_ntoa(&CurHostAddr));
4242 		}
4243 	}
4244 	else if (strcmp(status, "quarantined") == 0)
4245 	{
4246 		if (e->e_quarmsg != NULL)
4247 			(void) sm_snprintf(bp, SPACELEFT(buf, bp),
4248 					   ", quarantine=%s",
4249 					   shortenstring(e->e_quarmsg, 40));
4250 	}
4251 	else if (strcmp(status, "queued") != 0)
4252 	{
4253 		p = macvalue('h', e);
4254 		if (p != NULL && p[0] != '\0')
4255 		{
4256 			(void) sm_snprintf(bp, SPACELEFT(buf, bp),
4257 					   ", relay=%s", shortenstring(p, 40));
4258 		}
4259 	}
4260 	bp += strlen(bp);
4261 
4262 	/* dsn */
4263 	if (dsn != NULL && *dsn != '\0')
4264 	{
4265 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", dsn=",
4266 				   shortenstring(dsn, ENHSCLEN));
4267 		bp += strlen(bp);
4268 	}
4269 
4270 #if _FFR_LOG_NTRIES
4271 	/* ntries */
4272 	if (e->e_ntries >= 0)
4273 	{
4274 		(void) sm_snprintf(bp, SPACELEFT(buf, bp),
4275 				   ", ntries=%d", e->e_ntries + 1);
4276 		bp += strlen(bp);
4277 	}
4278 #endif /* _FFR_LOG_NTRIES */
4279 
4280 # define STATLEN		(((SYSLOG_BUFSIZE) - 100) / 4)
4281 # if (STATLEN) < 63
4282 #  undef STATLEN
4283 #  define STATLEN	63
4284 # endif /* (STATLEN) < 63 */
4285 # if (STATLEN) > 203
4286 #  undef STATLEN
4287 #  define STATLEN	203
4288 # endif /* (STATLEN) > 203 */
4289 
4290 	/* stat: max 210 bytes */
4291 	if ((bp - buf) > (sizeof buf - ((STATLEN) + 20)))
4292 	{
4293 		/* desperation move -- truncate data */
4294 		bp = buf + sizeof buf - ((STATLEN) + 17);
4295 		(void) sm_strlcpy(bp, "...", SPACELEFT(buf, bp));
4296 		bp += 3;
4297 	}
4298 
4299 	(void) sm_strlcpy(bp, ", stat=", SPACELEFT(buf, bp));
4300 	bp += strlen(bp);
4301 
4302 	(void) sm_strlcpy(bp, shortenstring(status, STATLEN),
4303 			  SPACELEFT(buf, bp));
4304 
4305 	/* id, to: max 13 + TOBUFSIZE bytes */
4306 	l = SYSLOG_BUFSIZE - 100 - strlen(buf);
4307 	if (l < 0)
4308 		l = 0;
4309 	p = e->e_to == NULL ? "NO-TO-LIST" : e->e_to;
4310 	while (strlen(p) >= l)
4311 	{
4312 		register char *q;
4313 
4314 		for (q = p + l; q > p; q--)
4315 		{
4316 			if (*q == ',')
4317 				break;
4318 		}
4319 		if (p == q)
4320 			break;
4321 		sm_syslog(LOG_INFO, e->e_id, "to=%.*s [more]%s",
4322 			  (int) (++q - p), p, buf);
4323 		p = q;
4324 	}
4325 	sm_syslog(LOG_INFO, e->e_id, "to=%.*s%s", l, p, buf);
4326 
4327 #else /* (SYSLOG_BUFSIZE) >= 256 */
4328 
4329 	l = SYSLOG_BUFSIZE - 85;
4330 	if (l < 0)
4331 		l = 0;
4332 	p = e->e_to == NULL ? "NO-TO-LIST" : e->e_to;
4333 	while (strlen(p) >= l)
4334 	{
4335 		register char *q;
4336 
4337 		for (q = p + l; q > p; q--)
4338 		{
4339 			if (*q == ',')
4340 				break;
4341 		}
4342 		if (p == q)
4343 			break;
4344 
4345 		sm_syslog(LOG_INFO, e->e_id, "to=%.*s [more]",
4346 			  (int) (++q - p), p);
4347 		p = q;
4348 	}
4349 	sm_syslog(LOG_INFO, e->e_id, "to=%.*s", l, p);
4350 
4351 	if (ctladdr != NULL)
4352 	{
4353 		bp = buf;
4354 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, "ctladdr=",
4355 				   shortenstring(ctladdr->q_paddr, 83));
4356 		bp += strlen(bp);
4357 		if (bitset(QGOODUID, ctladdr->q_flags))
4358 		{
4359 			(void) sm_snprintf(bp, SPACELEFT(buf, bp), " (%d/%d)",
4360 					   ctladdr->q_uid, ctladdr->q_gid);
4361 			bp += strlen(bp);
4362 		}
4363 		sm_syslog(LOG_INFO, e->e_id, "%s", buf);
4364 	}
4365 	bp = buf;
4366 	(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, "delay=",
4367 			   pintvl(now - e->e_ctime, true));
4368 	bp += strlen(bp);
4369 	if (xstart != (time_t) 0)
4370 	{
4371 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", xdelay=",
4372 				   pintvl(now - xstart, true));
4373 		bp += strlen(bp);
4374 	}
4375 
4376 	if (m != NULL)
4377 	{
4378 		(void) sm_strlcpyn(bp, SPACELEFT(buf, bp), 2, ", mailer=",
4379 				   m->m_name);
4380 		bp += strlen(bp);
4381 	}
4382 	sm_syslog(LOG_INFO, e->e_id, "%.1000s", buf);
4383 
4384 	buf[0] = '\0';
4385 	bp = buf;
4386 	if (mci != NULL && mci->mci_host != NULL)
4387 	{
4388 		extern SOCKADDR CurHostAddr;
4389 
4390 		(void) sm_snprintf(bp, SPACELEFT(buf, bp), "relay=%.100s",
4391 				   mci->mci_host);
4392 		bp += strlen(bp);
4393 
4394 		if (CurHostAddr.sa.sa_family != 0)
4395 			(void) sm_snprintf(bp, SPACELEFT(buf, bp),
4396 					   " [%.100s]",
4397 					   anynet_ntoa(&CurHostAddr));
4398 	}
4399 	else if (strcmp(status, "quarantined") == 0)
4400 	{
4401 		if (e->e_quarmsg != NULL)
4402 			(void) sm_snprintf(bp, SPACELEFT(buf, bp),
4403 					   ", quarantine=%.100s",
4404 					   e->e_quarmsg);
4405 	}
4406 	else if (strcmp(status, "queued") != 0)
4407 	{
4408 		p = macvalue('h', e);
4409 		if (p != NULL && p[0] != '\0')
4410 			(void) sm_snprintf(buf, sizeof buf, "relay=%.100s", p);
4411 	}
4412 	if (buf[0] != '\0')
4413 		sm_syslog(LOG_INFO, e->e_id, "%.1000s", buf);
4414 
4415 	sm_syslog(LOG_INFO, e->e_id, "stat=%s", shortenstring(status, 63));
4416 #endif /* (SYSLOG_BUFSIZE) >= 256 */
4417 }
4418 /*
4419 **  PUTFROMLINE -- output a UNIX-style from line (or whatever)
4420 **
4421 **	This can be made an arbitrary message separator by changing $l
4422 **
4423 **	One of the ugliest hacks seen by human eyes is contained herein:
4424 **	UUCP wants those stupid "remote from <host>" lines.  Why oh why
4425 **	does a well-meaning programmer such as myself have to deal with
4426 **	this kind of antique garbage????
4427 **
4428 **	Parameters:
4429 **		mci -- the connection information.
4430 **		e -- the envelope.
4431 **
4432 **	Returns:
4433 **		none
4434 **
4435 **	Side Effects:
4436 **		outputs some text to fp.
4437 */
4438 
4439 void
4440 putfromline(mci, e)
4441 	register MCI *mci;
4442 	ENVELOPE *e;
4443 {
4444 	char *template = UnixFromLine;
4445 	char buf[MAXLINE];
4446 	char xbuf[MAXLINE];
4447 
4448 	if (bitnset(M_NHDR, mci->mci_mailer->m_flags))
4449 		return;
4450 
4451 	mci->mci_flags |= MCIF_INHEADER;
4452 
4453 	if (bitnset(M_UGLYUUCP, mci->mci_mailer->m_flags))
4454 	{
4455 		char *bang;
4456 
4457 		expand("\201g", buf, sizeof buf, e);
4458 		bang = strchr(buf, '!');
4459 		if (bang == NULL)
4460 		{
4461 			char *at;
4462 			char hname[MAXNAME];
4463 
4464 			/*
4465 			**  If we can construct a UUCP path, do so
4466 			*/
4467 
4468 			at = strrchr(buf, '@');
4469 			if (at == NULL)
4470 			{
4471 				expand("\201k", hname, sizeof hname, e);
4472 				at = hname;
4473 			}
4474 			else
4475 				*at++ = '\0';
4476 			(void) sm_snprintf(xbuf, sizeof xbuf,
4477 					   "From %.800s  \201d remote from %.100s\n",
4478 					   buf, at);
4479 		}
4480 		else
4481 		{
4482 			*bang++ = '\0';
4483 			(void) sm_snprintf(xbuf, sizeof xbuf,
4484 					   "From %.800s  \201d remote from %.100s\n",
4485 					   bang, buf);
4486 			template = xbuf;
4487 		}
4488 	}
4489 	expand(template, buf, sizeof buf, e);
4490 	putxline(buf, strlen(buf), mci, PXLF_HEADER);
4491 }
4492 /*
4493 **  PUTBODY -- put the body of a message.
4494 **
4495 **	Parameters:
4496 **		mci -- the connection information.
4497 **		e -- the envelope to put out.
4498 **		separator -- if non-NULL, a message separator that must
4499 **			not be permitted in the resulting message.
4500 **
4501 **	Returns:
4502 **		none.
4503 **
4504 **	Side Effects:
4505 **		The message is written onto fp.
4506 */
4507 
4508 /* values for output state variable */
4509 #define OS_HEAD		0	/* at beginning of line */
4510 #define OS_CR		1	/* read a carriage return */
4511 #define OS_INLINE	2	/* putting rest of line */
4512 
4513 void
4514 putbody(mci, e, separator)
4515 	register MCI *mci;
4516 	register ENVELOPE *e;
4517 	char *separator;
4518 {
4519 	bool dead = false;
4520 	char buf[MAXLINE];
4521 #if MIME8TO7
4522 	char *boundaries[MAXMIMENESTING + 1];
4523 #endif /* MIME8TO7 */
4524 
4525 	/*
4526 	**  Output the body of the message
4527 	*/
4528 
4529 	if (e->e_dfp == NULL && bitset(EF_HAS_DF, e->e_flags))
4530 	{
4531 		char *df = queuename(e, DATAFL_LETTER);
4532 
4533 		e->e_dfp = sm_io_open(SmFtStdio, SM_TIME_DEFAULT, df,
4534 				      SM_IO_RDONLY_B, NULL);
4535 		if (e->e_dfp == NULL)
4536 		{
4537 			char *msg = "!putbody: Cannot open %s for %s from %s";
4538 
4539 			if (errno == ENOENT)
4540 				msg++;
4541 			syserr(msg, df, e->e_to, e->e_from.q_paddr);
4542 		}
4543 
4544 	}
4545 	if (e->e_dfp == NULL)
4546 	{
4547 		if (bitset(MCIF_INHEADER, mci->mci_flags))
4548 		{
4549 			putline("", mci);
4550 			mci->mci_flags &= ~MCIF_INHEADER;
4551 		}
4552 		putline("<<< No Message Collected >>>", mci);
4553 		goto endofmessage;
4554 	}
4555 
4556 	if (e->e_dfino == (ino_t) 0)
4557 	{
4558 		struct stat stbuf;
4559 
4560 		if (fstat(sm_io_getinfo(e->e_dfp, SM_IO_WHAT_FD, NULL), &stbuf)
4561 		    < 0)
4562 			e->e_dfino = -1;
4563 		else
4564 		{
4565 			e->e_dfdev = stbuf.st_dev;
4566 			e->e_dfino = stbuf.st_ino;
4567 		}
4568 	}
4569 
4570 	/* paranoia: the data file should always be in a rewound state */
4571 	(void) bfrewind(e->e_dfp);
4572 
4573 #if MIME8TO7
4574 	if (bitset(MCIF_CVT8TO7, mci->mci_flags))
4575 	{
4576 		/*
4577 		**  Do 8 to 7 bit MIME conversion.
4578 		*/
4579 
4580 		/* make sure it looks like a MIME message */
4581 		if (hvalue("MIME-Version", e->e_header) == NULL)
4582 			putline("MIME-Version: 1.0", mci);
4583 
4584 		if (hvalue("Content-Type", e->e_header) == NULL)
4585 		{
4586 			(void) sm_snprintf(buf, sizeof buf,
4587 					   "Content-Type: text/plain; charset=%s",
4588 					   defcharset(e));
4589 			putline(buf, mci);
4590 		}
4591 
4592 		/* now do the hard work */
4593 		boundaries[0] = NULL;
4594 		mci->mci_flags |= MCIF_INHEADER;
4595 		(void) mime8to7(mci, e->e_header, e, boundaries, M87F_OUTER);
4596 	}
4597 # if MIME7TO8
4598 	else if (bitset(MCIF_CVT7TO8, mci->mci_flags))
4599 	{
4600 		(void) mime7to8(mci, e->e_header, e);
4601 	}
4602 # endif /* MIME7TO8 */
4603 	else if (MaxMimeHeaderLength > 0 || MaxMimeFieldLength > 0)
4604 	{
4605 		bool oldsuprerrs = SuprErrs;
4606 
4607 		/* Use mime8to7 to check multipart for MIME header overflows */
4608 		boundaries[0] = NULL;
4609 		mci->mci_flags |= MCIF_INHEADER;
4610 
4611 		/*
4612 		**  If EF_DONT_MIME is set, we have a broken MIME message
4613 		**  and don't want to generate a new bounce message whose
4614 		**  body propagates the broken MIME.  We can't just not call
4615 		**  mime8to7() as is done above since we need the security
4616 		**  checks.  The best we can do is suppress the errors.
4617 		*/
4618 
4619 		if (bitset(EF_DONT_MIME, e->e_flags))
4620 			SuprErrs = true;
4621 
4622 		(void) mime8to7(mci, e->e_header, e, boundaries,
4623 				M87F_OUTER|M87F_NO8TO7);
4624 
4625 		/* restore SuprErrs */
4626 		SuprErrs = oldsuprerrs;
4627 	}
4628 	else
4629 #endif /* MIME8TO7 */
4630 	{
4631 		int ostate;
4632 		register char *bp;
4633 		register char *pbp;
4634 		register int c;
4635 		register char *xp;
4636 		int padc;
4637 		char *buflim;
4638 		int pos = 0;
4639 		char peekbuf[12];
4640 
4641 		if (bitset(MCIF_INHEADER, mci->mci_flags))
4642 		{
4643 			putline("", mci);
4644 			mci->mci_flags &= ~MCIF_INHEADER;
4645 		}
4646 
4647 		/* determine end of buffer; allow for short mailer lines */
4648 		buflim = &buf[sizeof buf - 1];
4649 		if (mci->mci_mailer->m_linelimit > 0 &&
4650 		    mci->mci_mailer->m_linelimit < sizeof buf - 1)
4651 			buflim = &buf[mci->mci_mailer->m_linelimit - 1];
4652 
4653 		/* copy temp file to output with mapping */
4654 		ostate = OS_HEAD;
4655 		bp = buf;
4656 		pbp = peekbuf;
4657 		while (!sm_io_error(mci->mci_out) && !dead)
4658 		{
4659 			if (pbp > peekbuf)
4660 				c = *--pbp;
4661 			else if ((c = sm_io_getc(e->e_dfp, SM_TIME_DEFAULT))
4662 				 == SM_IO_EOF)
4663 				break;
4664 			if (bitset(MCIF_7BIT, mci->mci_flags))
4665 				c &= 0x7f;
4666 			switch (ostate)
4667 			{
4668 			  case OS_HEAD:
4669 				if (c == '\0' &&
4670 				    bitnset(M_NONULLS,
4671 					    mci->mci_mailer->m_flags))
4672 					break;
4673 				if (c != '\r' && c != '\n' && bp < buflim)
4674 				{
4675 					*bp++ = c;
4676 					break;
4677 				}
4678 
4679 				/* check beginning of line for special cases */
4680 				*bp = '\0';
4681 				pos = 0;
4682 				padc = SM_IO_EOF;
4683 				if (buf[0] == 'F' &&
4684 				    bitnset(M_ESCFROM, mci->mci_mailer->m_flags)
4685 				    && strncmp(buf, "From ", 5) == 0)
4686 				{
4687 					padc = '>';
4688 				}
4689 				if (buf[0] == '-' && buf[1] == '-' &&
4690 				    separator != NULL)
4691 				{
4692 					/* possible separator */
4693 					int sl = strlen(separator);
4694 
4695 					if (strncmp(&buf[2], separator, sl)
4696 					    == 0)
4697 						padc = ' ';
4698 				}
4699 				if (buf[0] == '.' &&
4700 				    bitnset(M_XDOT, mci->mci_mailer->m_flags))
4701 				{
4702 					padc = '.';
4703 				}
4704 
4705 				/* now copy out saved line */
4706 				if (TrafficLogFile != NULL)
4707 				{
4708 					(void) sm_io_fprintf(TrafficLogFile,
4709 							     SM_TIME_DEFAULT,
4710 							     "%05d >>> ",
4711 							     (int) CurrentPid);
4712 					if (padc != SM_IO_EOF)
4713 						(void) sm_io_putc(TrafficLogFile,
4714 								  SM_TIME_DEFAULT,
4715 								  padc);
4716 					for (xp = buf; xp < bp; xp++)
4717 						(void) sm_io_putc(TrafficLogFile,
4718 								  SM_TIME_DEFAULT,
4719 								  (unsigned char) *xp);
4720 					if (c == '\n')
4721 						(void) sm_io_fputs(TrafficLogFile,
4722 								   SM_TIME_DEFAULT,
4723 								   mci->mci_mailer->m_eol);
4724 				}
4725 				if (padc != SM_IO_EOF)
4726 				{
4727 					if (sm_io_putc(mci->mci_out,
4728 						       SM_TIME_DEFAULT, padc)
4729 					    == SM_IO_EOF)
4730 					{
4731 						dead = true;
4732 						continue;
4733 					}
4734 					else
4735 					{
4736 						/* record progress for DATA timeout */
4737 						DataProgress = true;
4738 					}
4739 					pos++;
4740 				}
4741 				for (xp = buf; xp < bp; xp++)
4742 				{
4743 					if (sm_io_putc(mci->mci_out,
4744 						       SM_TIME_DEFAULT,
4745 						       (unsigned char) *xp)
4746 					    == SM_IO_EOF)
4747 					{
4748 						dead = true;
4749 						break;
4750 					}
4751 					else
4752 					{
4753 						/* record progress for DATA timeout */
4754 						DataProgress = true;
4755 					}
4756 				}
4757 				if (dead)
4758 					continue;
4759 				if (c == '\n')
4760 				{
4761 					if (sm_io_fputs(mci->mci_out,
4762 							SM_TIME_DEFAULT,
4763 							mci->mci_mailer->m_eol)
4764 							== SM_IO_EOF)
4765 						break;
4766 					else
4767 					{
4768 						/* record progress for DATA timeout */
4769 						DataProgress = true;
4770 					}
4771 					pos = 0;
4772 				}
4773 				else
4774 				{
4775 					pos += bp - buf;
4776 					if (c != '\r')
4777 					{
4778 						SM_ASSERT(pbp < peekbuf +
4779 								sizeof(peekbuf));
4780 						*pbp++ = c;
4781 					}
4782 				}
4783 
4784 				bp = buf;
4785 
4786 				/* determine next state */
4787 				if (c == '\n')
4788 					ostate = OS_HEAD;
4789 				else if (c == '\r')
4790 					ostate = OS_CR;
4791 				else
4792 					ostate = OS_INLINE;
4793 				continue;
4794 
4795 			  case OS_CR:
4796 				if (c == '\n')
4797 				{
4798 					/* got CRLF */
4799 					if (sm_io_fputs(mci->mci_out,
4800 							SM_TIME_DEFAULT,
4801 							mci->mci_mailer->m_eol)
4802 							== SM_IO_EOF)
4803 						continue;
4804 					else
4805 					{
4806 						/* record progress for DATA timeout */
4807 						DataProgress = true;
4808 					}
4809 
4810 					if (TrafficLogFile != NULL)
4811 					{
4812 						(void) sm_io_fputs(TrafficLogFile,
4813 								   SM_TIME_DEFAULT,
4814 								   mci->mci_mailer->m_eol);
4815 					}
4816 					ostate = OS_HEAD;
4817 					continue;
4818 				}
4819 
4820 				/* had a naked carriage return */
4821 				SM_ASSERT(pbp < peekbuf + sizeof(peekbuf));
4822 				*pbp++ = c;
4823 				c = '\r';
4824 				ostate = OS_INLINE;
4825 				goto putch;
4826 
4827 			  case OS_INLINE:
4828 				if (c == '\r')
4829 				{
4830 					ostate = OS_CR;
4831 					continue;
4832 				}
4833 				if (c == '\0' &&
4834 				    bitnset(M_NONULLS,
4835 					    mci->mci_mailer->m_flags))
4836 					break;
4837 putch:
4838 				if (mci->mci_mailer->m_linelimit > 0 &&
4839 				    pos >= mci->mci_mailer->m_linelimit - 1 &&
4840 				    c != '\n')
4841 				{
4842 					int d;
4843 
4844 					/* check next character for EOL */
4845 					if (pbp > peekbuf)
4846 						d = *(pbp - 1);
4847 					else if ((d = sm_io_getc(e->e_dfp,
4848 								 SM_TIME_DEFAULT))
4849 						 != SM_IO_EOF)
4850 					{
4851 						SM_ASSERT(pbp < peekbuf +
4852 								sizeof(peekbuf));
4853 						*pbp++ = d;
4854 					}
4855 
4856 					if (d == '\n' || d == SM_IO_EOF)
4857 					{
4858 						if (TrafficLogFile != NULL)
4859 							(void) sm_io_putc(TrafficLogFile,
4860 									  SM_TIME_DEFAULT,
4861 									  (unsigned char) c);
4862 						if (sm_io_putc(mci->mci_out,
4863 							       SM_TIME_DEFAULT,
4864 							       (unsigned char) c)
4865 							       == SM_IO_EOF)
4866 						{
4867 							dead = true;
4868 							continue;
4869 						}
4870 						else
4871 						{
4872 							/* record progress for DATA timeout */
4873 							DataProgress = true;
4874 						}
4875 						pos++;
4876 						continue;
4877 					}
4878 
4879 					if (sm_io_putc(mci->mci_out,
4880 						       SM_TIME_DEFAULT, '!')
4881 					    == SM_IO_EOF ||
4882 					    sm_io_fputs(mci->mci_out,
4883 							SM_TIME_DEFAULT,
4884 							mci->mci_mailer->m_eol)
4885 					    == SM_IO_EOF)
4886 					{
4887 						dead = true;
4888 						continue;
4889 					}
4890 					else
4891 					{
4892 						/* record progress for DATA timeout */
4893 						DataProgress = true;
4894 					}
4895 
4896 					if (TrafficLogFile != NULL)
4897 					{
4898 						(void) sm_io_fprintf(TrafficLogFile,
4899 								     SM_TIME_DEFAULT,
4900 								     "!%s",
4901 								     mci->mci_mailer->m_eol);
4902 					}
4903 					ostate = OS_HEAD;
4904 					SM_ASSERT(pbp < peekbuf +
4905 							sizeof(peekbuf));
4906 					*pbp++ = c;
4907 					continue;
4908 				}
4909 				if (c == '\n')
4910 				{
4911 					if (TrafficLogFile != NULL)
4912 						(void) sm_io_fputs(TrafficLogFile,
4913 								   SM_TIME_DEFAULT,
4914 								   mci->mci_mailer->m_eol);
4915 					if (sm_io_fputs(mci->mci_out,
4916 							SM_TIME_DEFAULT,
4917 							mci->mci_mailer->m_eol)
4918 							== SM_IO_EOF)
4919 						continue;
4920 					else
4921 					{
4922 						/* record progress for DATA timeout */
4923 						DataProgress = true;
4924 					}
4925 					pos = 0;
4926 					ostate = OS_HEAD;
4927 				}
4928 				else
4929 				{
4930 					if (TrafficLogFile != NULL)
4931 						(void) sm_io_putc(TrafficLogFile,
4932 								  SM_TIME_DEFAULT,
4933 								  (unsigned char) c);
4934 					if (sm_io_putc(mci->mci_out,
4935 						       SM_TIME_DEFAULT,
4936 						       (unsigned char) c)
4937 					    == SM_IO_EOF)
4938 					{
4939 						dead = true;
4940 						continue;
4941 					}
4942 					else
4943 					{
4944 						/* record progress for DATA timeout */
4945 						DataProgress = true;
4946 					}
4947 					pos++;
4948 					ostate = OS_INLINE;
4949 				}
4950 				break;
4951 			}
4952 		}
4953 
4954 		/* make sure we are at the beginning of a line */
4955 		if (bp > buf)
4956 		{
4957 			if (TrafficLogFile != NULL)
4958 			{
4959 				for (xp = buf; xp < bp; xp++)
4960 					(void) sm_io_putc(TrafficLogFile,
4961 							  SM_TIME_DEFAULT,
4962 							  (unsigned char) *xp);
4963 			}
4964 			for (xp = buf; xp < bp; xp++)
4965 			{
4966 				if (sm_io_putc(mci->mci_out, SM_TIME_DEFAULT,
4967 					       (unsigned char) *xp)
4968 				    == SM_IO_EOF)
4969 				{
4970 					dead = true;
4971 					break;
4972 				}
4973 				else
4974 				{
4975 					/* record progress for DATA timeout */
4976 					DataProgress = true;
4977 				}
4978 			}
4979 			pos += bp - buf;
4980 		}
4981 		if (!dead && pos > 0)
4982 		{
4983 			if (TrafficLogFile != NULL)
4984 				(void) sm_io_fputs(TrafficLogFile,
4985 						   SM_TIME_DEFAULT,
4986 						   mci->mci_mailer->m_eol);
4987 			(void) sm_io_fputs(mci->mci_out, SM_TIME_DEFAULT,
4988 					   mci->mci_mailer->m_eol);
4989 
4990 			/* record progress for DATA timeout */
4991 			DataProgress = true;
4992 		}
4993 	}
4994 
4995 	if (sm_io_error(e->e_dfp))
4996 	{
4997 		syserr("putbody: %s/%cf%s: read error",
4998 		       qid_printqueue(e->e_dfqgrp, e->e_dfqdir),
4999 		       DATAFL_LETTER, e->e_id);
5000 		ExitStat = EX_IOERR;
5001 	}
5002 
5003 endofmessage:
5004 	/*
5005 	**  Since mailfile() uses e_dfp in a child process,
5006 	**  the file offset in the stdio library for the
5007 	**  parent process will not agree with the in-kernel
5008 	**  file offset since the file descriptor is shared
5009 	**  between the processes.  Therefore, it is vital
5010 	**  that the file always be rewound.  This forces the
5011 	**  kernel offset (lseek) and stdio library (ftell)
5012 	**  offset to match.
5013 	*/
5014 
5015 	if (e->e_dfp != NULL)
5016 		(void) bfrewind(e->e_dfp);
5017 
5018 	/* some mailers want extra blank line at end of message */
5019 	if (!dead && bitnset(M_BLANKEND, mci->mci_mailer->m_flags) &&
5020 	    buf[0] != '\0' && buf[0] != '\n')
5021 		putline("", mci);
5022 
5023 	(void) sm_io_flush(mci->mci_out, SM_TIME_DEFAULT);
5024 	if (sm_io_error(mci->mci_out) && errno != EPIPE)
5025 	{
5026 		syserr("putbody: write error");
5027 		ExitStat = EX_IOERR;
5028 	}
5029 
5030 	errno = 0;
5031 }
5032 /*
5033 **  MAILFILE -- Send a message to a file.
5034 **
5035 **	If the file has the set-user-ID/set-group-ID bits set, but NO
5036 **	execute bits, sendmail will try to become the owner of that file
5037 **	rather than the real user.  Obviously, this only works if
5038 **	sendmail runs as root.
5039 **
5040 **	This could be done as a subordinate mailer, except that it
5041 **	is used implicitly to save messages in ~/dead.letter.  We
5042 **	view this as being sufficiently important as to include it
5043 **	here.  For example, if the system is dying, we shouldn't have
5044 **	to create another process plus some pipes to save the message.
5045 **
5046 **	Parameters:
5047 **		filename -- the name of the file to send to.
5048 **		mailer -- mailer definition for recipient -- if NULL,
5049 **			use FileMailer.
5050 **		ctladdr -- the controlling address header -- includes
5051 **			the userid/groupid to be when sending.
5052 **		sfflags -- flags for opening.
5053 **		e -- the current envelope.
5054 **
5055 **	Returns:
5056 **		The exit code associated with the operation.
5057 **
5058 **	Side Effects:
5059 **		none.
5060 */
5061 
5062 # define RETURN(st)			exit(st);
5063 
5064 static jmp_buf	CtxMailfileTimeout;
5065 
5066 int
5067 mailfile(filename, mailer, ctladdr, sfflags, e)
5068 	char *volatile filename;
5069 	MAILER *volatile mailer;
5070 	ADDRESS *ctladdr;
5071 	volatile long sfflags;
5072 	register ENVELOPE *e;
5073 {
5074 	register SM_FILE_T *f;
5075 	register pid_t pid = -1;
5076 	volatile int mode;
5077 	int len;
5078 	off_t curoff;
5079 	bool suidwarn = geteuid() == 0;
5080 	char *p;
5081 	char *volatile realfile;
5082 	SM_EVENT *ev;
5083 	char buf[MAXPATHLEN];
5084 	char targetfile[MAXPATHLEN];
5085 
5086 	if (tTd(11, 1))
5087 	{
5088 		sm_dprintf("mailfile %s\n  ctladdr=", filename);
5089 		printaddr(sm_debug_file(), ctladdr, false);
5090 	}
5091 
5092 	if (mailer == NULL)
5093 		mailer = FileMailer;
5094 
5095 	if (e->e_xfp != NULL)
5096 		(void) sm_io_flush(e->e_xfp, SM_TIME_DEFAULT);
5097 
5098 	/*
5099 	**  Special case /dev/null.  This allows us to restrict file
5100 	**  delivery to regular files only.
5101 	*/
5102 
5103 	if (sm_path_isdevnull(filename))
5104 		return EX_OK;
5105 
5106 	/* check for 8-bit available */
5107 	if (bitset(EF_HAS8BIT, e->e_flags) &&
5108 	    bitnset(M_7BITS, mailer->m_flags) &&
5109 	    (bitset(EF_DONT_MIME, e->e_flags) ||
5110 	     !(bitset(MM_MIME8BIT, MimeMode) ||
5111 	       (bitset(EF_IS_MIME, e->e_flags) &&
5112 		bitset(MM_CVTMIME, MimeMode)))))
5113 	{
5114 		e->e_status = "5.6.3";
5115 		usrerrenh(e->e_status,
5116 			  "554 Cannot send 8-bit data to 7-bit destination");
5117 		errno = 0;
5118 		return EX_DATAERR;
5119 	}
5120 
5121 	/* Find the actual file */
5122 	if (SafeFileEnv != NULL && SafeFileEnv[0] != '\0')
5123 	{
5124 		len = strlen(SafeFileEnv);
5125 
5126 		if (strncmp(SafeFileEnv, filename, len) == 0)
5127 			filename += len;
5128 
5129 		if (len + strlen(filename) + 1 >= sizeof targetfile)
5130 		{
5131 			syserr("mailfile: filename too long (%s/%s)",
5132 			       SafeFileEnv, filename);
5133 			return EX_CANTCREAT;
5134 		}
5135 		(void) sm_strlcpy(targetfile, SafeFileEnv, sizeof targetfile);
5136 		realfile = targetfile + len;
5137 		if (*filename == '/')
5138 			filename++;
5139 		if (*filename != '\0')
5140 		{
5141 			/* paranoia: trailing / should be removed in readcf */
5142 			if (targetfile[len - 1] != '/')
5143 				(void) sm_strlcat(targetfile,
5144 						  "/", sizeof targetfile);
5145 			(void) sm_strlcat(targetfile, filename,
5146 					  sizeof targetfile);
5147 		}
5148 	}
5149 	else if (mailer->m_rootdir != NULL)
5150 	{
5151 		expand(mailer->m_rootdir, targetfile, sizeof targetfile, e);
5152 		len = strlen(targetfile);
5153 
5154 		if (strncmp(targetfile, filename, len) == 0)
5155 			filename += len;
5156 
5157 		if (len + strlen(filename) + 1 >= sizeof targetfile)
5158 		{
5159 			syserr("mailfile: filename too long (%s/%s)",
5160 			       targetfile, filename);
5161 			return EX_CANTCREAT;
5162 		}
5163 		realfile = targetfile + len;
5164 		if (targetfile[len - 1] != '/')
5165 			(void) sm_strlcat(targetfile, "/", sizeof targetfile);
5166 		if (*filename == '/')
5167 			(void) sm_strlcat(targetfile, filename + 1,
5168 					  sizeof targetfile);
5169 		else
5170 			(void) sm_strlcat(targetfile, filename,
5171 					  sizeof targetfile);
5172 	}
5173 	else
5174 	{
5175 		if (sm_strlcpy(targetfile, filename, sizeof targetfile) >=
5176 		    sizeof targetfile)
5177 		{
5178 			syserr("mailfile: filename too long (%s)", filename);
5179 			return EX_CANTCREAT;
5180 		}
5181 		realfile = targetfile;
5182 	}
5183 
5184 	/*
5185 	**  Fork so we can change permissions here.
5186 	**	Note that we MUST use fork, not vfork, because of
5187 	**	the complications of calling subroutines, etc.
5188 	*/
5189 
5190 
5191 	/*
5192 	**  Dispose of SIGCHLD signal catchers that may be laying
5193 	**  around so that the waitfor() below will get it.
5194 	*/
5195 
5196 	(void) sm_signal(SIGCHLD, SIG_DFL);
5197 
5198 	DOFORK(fork);
5199 
5200 	if (pid < 0)
5201 		return EX_OSERR;
5202 	else if (pid == 0)
5203 	{
5204 		/* child -- actually write to file */
5205 		struct stat stb;
5206 		MCI mcibuf;
5207 		int err;
5208 		volatile int oflags = O_WRONLY|O_APPEND;
5209 
5210 		/* Reset global flags */
5211 		RestartRequest = NULL;
5212 		RestartWorkGroup = false;
5213 		ShutdownRequest = NULL;
5214 		PendingSignal = 0;
5215 		CurrentPid = getpid();
5216 
5217 		if (e->e_lockfp != NULL)
5218 			(void) close(sm_io_getinfo(e->e_lockfp, SM_IO_WHAT_FD,
5219 				     NULL));
5220 
5221 		(void) sm_signal(SIGINT, SIG_DFL);
5222 		(void) sm_signal(SIGHUP, SIG_DFL);
5223 		(void) sm_signal(SIGTERM, SIG_DFL);
5224 		(void) umask(OldUmask);
5225 		e->e_to = filename;
5226 		ExitStat = EX_OK;
5227 
5228 		if (setjmp(CtxMailfileTimeout) != 0)
5229 		{
5230 			RETURN(EX_TEMPFAIL);
5231 		}
5232 
5233 		if (TimeOuts.to_fileopen > 0)
5234 			ev = sm_setevent(TimeOuts.to_fileopen, mailfiletimeout,
5235 					 0);
5236 		else
5237 			ev = NULL;
5238 
5239 		/* check file mode to see if set-user-ID */
5240 		if (stat(targetfile, &stb) < 0)
5241 			mode = FileMode;
5242 		else
5243 			mode = stb.st_mode;
5244 
5245 		/* limit the errors to those actually caused in the child */
5246 		errno = 0;
5247 		ExitStat = EX_OK;
5248 
5249 		/* Allow alias expansions to use the S_IS{U,G}ID bits */
5250 		if ((ctladdr != NULL && !bitset(QALIAS, ctladdr->q_flags)) ||
5251 		    bitset(SFF_RUNASREALUID, sfflags))
5252 		{
5253 			/* ignore set-user-ID and set-group-ID bits */
5254 			mode &= ~(S_ISGID|S_ISUID);
5255 			if (tTd(11, 20))
5256 				sm_dprintf("mailfile: ignoring set-user-ID/set-group-ID bits\n");
5257 		}
5258 
5259 		/* we have to open the data file BEFORE setuid() */
5260 		if (e->e_dfp == NULL && bitset(EF_HAS_DF, e->e_flags))
5261 		{
5262 			char *df = queuename(e, DATAFL_LETTER);
5263 
5264 			e->e_dfp = sm_io_open(SmFtStdio, SM_TIME_DEFAULT, df,
5265 					      SM_IO_RDONLY_B, NULL);
5266 			if (e->e_dfp == NULL)
5267 			{
5268 				syserr("mailfile: Cannot open %s for %s from %s",
5269 					df, e->e_to, e->e_from.q_paddr);
5270 			}
5271 		}
5272 
5273 		/* select a new user to run as */
5274 		if (!bitset(SFF_RUNASREALUID, sfflags))
5275 		{
5276 			if (bitnset(M_SPECIFIC_UID, mailer->m_flags))
5277 			{
5278 				RealUserName = NULL;
5279 				if (mailer->m_uid == NO_UID)
5280 					RealUid = RunAsUid;
5281 				else
5282 					RealUid = mailer->m_uid;
5283 				if (RunAsUid != 0 && RealUid != RunAsUid)
5284 				{
5285 					/* Only root can change the uid */
5286 					syserr("mailfile: insufficient privileges to change uid, RunAsUid=%d, RealUid=%d",
5287 						(int) RunAsUid, (int) RealUid);
5288 					RETURN(EX_TEMPFAIL);
5289 				}
5290 			}
5291 			else if (bitset(S_ISUID, mode))
5292 			{
5293 				RealUserName = NULL;
5294 				RealUid = stb.st_uid;
5295 			}
5296 			else if (ctladdr != NULL && ctladdr->q_uid != 0)
5297 			{
5298 				if (ctladdr->q_ruser != NULL)
5299 					RealUserName = ctladdr->q_ruser;
5300 				else
5301 					RealUserName = ctladdr->q_user;
5302 				RealUid = ctladdr->q_uid;
5303 			}
5304 			else if (mailer != NULL && mailer->m_uid != NO_UID)
5305 			{
5306 				RealUserName = DefUser;
5307 				RealUid = mailer->m_uid;
5308 			}
5309 			else
5310 			{
5311 				RealUserName = DefUser;
5312 				RealUid = DefUid;
5313 			}
5314 
5315 			/* select a new group to run as */
5316 			if (bitnset(M_SPECIFIC_UID, mailer->m_flags))
5317 			{
5318 				if (mailer->m_gid == NO_GID)
5319 					RealGid = RunAsGid;
5320 				else
5321 					RealGid = mailer->m_gid;
5322 				if (RunAsUid != 0 &&
5323 				    (RealGid != getgid() ||
5324 				     RealGid != getegid()))
5325 				{
5326 					/* Only root can change the gid */
5327 					syserr("mailfile: insufficient privileges to change gid, RealGid=%d, RunAsUid=%d, gid=%d, egid=%d",
5328 					       (int) RealGid, (int) RunAsUid,
5329 					       (int) getgid(), (int) getegid());
5330 					RETURN(EX_TEMPFAIL);
5331 				}
5332 			}
5333 			else if (bitset(S_ISGID, mode))
5334 				RealGid = stb.st_gid;
5335 			else if (ctladdr != NULL &&
5336 				 ctladdr->q_uid == DefUid &&
5337 				 ctladdr->q_gid == 0)
5338 			{
5339 				/*
5340 				**  Special case:  This means it is an
5341 				**  alias and we should act as DefaultUser.
5342 				**  See alias()'s comments.
5343 				*/
5344 
5345 				RealGid = DefGid;
5346 				RealUserName = DefUser;
5347 			}
5348 			else if (ctladdr != NULL && ctladdr->q_uid != 0)
5349 				RealGid = ctladdr->q_gid;
5350 			else if (mailer != NULL && mailer->m_gid != NO_GID)
5351 				RealGid = mailer->m_gid;
5352 			else
5353 				RealGid = DefGid;
5354 		}
5355 
5356 		/* last ditch */
5357 		if (!bitset(SFF_ROOTOK, sfflags))
5358 		{
5359 			if (RealUid == 0)
5360 				RealUid = DefUid;
5361 			if (RealGid == 0)
5362 				RealGid = DefGid;
5363 		}
5364 
5365 		/* set group id list (needs /etc/group access) */
5366 		if (RealUserName != NULL && !DontInitGroups)
5367 		{
5368 			if (initgroups(RealUserName, RealGid) == -1 && suidwarn)
5369 			{
5370 				syserr("mailfile: initgroups(%s, %d) failed",
5371 					RealUserName, RealGid);
5372 				RETURN(EX_TEMPFAIL);
5373 			}
5374 		}
5375 		else
5376 		{
5377 			GIDSET_T gidset[1];
5378 
5379 			gidset[0] = RealGid;
5380 			if (setgroups(1, gidset) == -1 && suidwarn)
5381 			{
5382 				syserr("mailfile: setgroups() failed");
5383 				RETURN(EX_TEMPFAIL);
5384 			}
5385 		}
5386 
5387 		/*
5388 		**  If you have a safe environment, go into it.
5389 		*/
5390 
5391 		if (realfile != targetfile)
5392 		{
5393 			char save;
5394 
5395 			save = *realfile;
5396 			*realfile = '\0';
5397 			if (tTd(11, 20))
5398 				sm_dprintf("mailfile: chroot %s\n", targetfile);
5399 			if (chroot(targetfile) < 0)
5400 			{
5401 				syserr("mailfile: Cannot chroot(%s)",
5402 				       targetfile);
5403 				RETURN(EX_CANTCREAT);
5404 			}
5405 			*realfile = save;
5406 		}
5407 
5408 		if (tTd(11, 40))
5409 			sm_dprintf("mailfile: deliver to %s\n", realfile);
5410 
5411 		if (chdir("/") < 0)
5412 		{
5413 			syserr("mailfile: cannot chdir(/)");
5414 			RETURN(EX_CANTCREAT);
5415 		}
5416 
5417 		/* now reset the group and user ids */
5418 		endpwent();
5419 		sm_mbdb_terminate();
5420 		if (setgid(RealGid) < 0 && suidwarn)
5421 		{
5422 			syserr("mailfile: setgid(%ld) failed", (long) RealGid);
5423 			RETURN(EX_TEMPFAIL);
5424 		}
5425 		vendor_set_uid(RealUid);
5426 		if (setuid(RealUid) < 0 && suidwarn)
5427 		{
5428 			syserr("mailfile: setuid(%ld) failed", (long) RealUid);
5429 			RETURN(EX_TEMPFAIL);
5430 		}
5431 
5432 		if (tTd(11, 2))
5433 			sm_dprintf("mailfile: running as r/euid=%d/%d, r/egid=%d/%d\n",
5434 				(int) getuid(), (int) geteuid(),
5435 				(int) getgid(), (int) getegid());
5436 
5437 
5438 		/* move into some "safe" directory */
5439 		if (mailer->m_execdir != NULL)
5440 		{
5441 			char *q;
5442 
5443 			for (p = mailer->m_execdir; p != NULL; p = q)
5444 			{
5445 				q = strchr(p, ':');
5446 				if (q != NULL)
5447 					*q = '\0';
5448 				expand(p, buf, sizeof buf, e);
5449 				if (q != NULL)
5450 					*q++ = ':';
5451 				if (tTd(11, 20))
5452 					sm_dprintf("mailfile: trydir %s\n",
5453 						   buf);
5454 				if (buf[0] != '\0' && chdir(buf) >= 0)
5455 					break;
5456 			}
5457 		}
5458 
5459 		/*
5460 		**  Recheck the file after we have assumed the ID of the
5461 		**  delivery user to make sure we can deliver to it as
5462 		**  that user.  This is necessary if sendmail is running
5463 		**  as root and the file is on an NFS mount which treats
5464 		**  root as nobody.
5465 		*/
5466 
5467 #if HASLSTAT
5468 		if (bitnset(DBS_FILEDELIVERYTOSYMLINK, DontBlameSendmail))
5469 			err = stat(realfile, &stb);
5470 		else
5471 			err = lstat(realfile, &stb);
5472 #else /* HASLSTAT */
5473 		err = stat(realfile, &stb);
5474 #endif /* HASLSTAT */
5475 
5476 		if (err < 0)
5477 		{
5478 			stb.st_mode = ST_MODE_NOFILE;
5479 			mode = FileMode;
5480 			oflags |= O_CREAT|O_EXCL;
5481 		}
5482 		else if (bitset(S_IXUSR|S_IXGRP|S_IXOTH, mode) ||
5483 			 (!bitnset(DBS_FILEDELIVERYTOHARDLINK,
5484 				   DontBlameSendmail) &&
5485 			  stb.st_nlink != 1) ||
5486 			 (realfile != targetfile && !S_ISREG(mode)))
5487 			exit(EX_CANTCREAT);
5488 		else
5489 			mode = stb.st_mode;
5490 
5491 		if (!bitnset(DBS_FILEDELIVERYTOSYMLINK, DontBlameSendmail))
5492 			sfflags |= SFF_NOSLINK;
5493 		if (!bitnset(DBS_FILEDELIVERYTOHARDLINK, DontBlameSendmail))
5494 			sfflags |= SFF_NOHLINK;
5495 		sfflags &= ~SFF_OPENASROOT;
5496 		f = safefopen(realfile, oflags, mode, sfflags);
5497 		if (f == NULL)
5498 		{
5499 			if (transienterror(errno))
5500 			{
5501 				usrerr("454 4.3.0 cannot open %s: %s",
5502 				       shortenstring(realfile, MAXSHORTSTR),
5503 				       sm_errstring(errno));
5504 				RETURN(EX_TEMPFAIL);
5505 			}
5506 			else
5507 			{
5508 				usrerr("554 5.3.0 cannot open %s: %s",
5509 				       shortenstring(realfile, MAXSHORTSTR),
5510 				       sm_errstring(errno));
5511 				RETURN(EX_CANTCREAT);
5512 			}
5513 		}
5514 		if (filechanged(realfile, sm_io_getinfo(f, SM_IO_WHAT_FD, NULL),
5515 		    &stb))
5516 		{
5517 			syserr("554 5.3.0 file changed after open");
5518 			RETURN(EX_CANTCREAT);
5519 		}
5520 		if (fstat(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL), &stb) < 0)
5521 		{
5522 			syserr("554 5.3.0 cannot fstat %s",
5523 				sm_errstring(errno));
5524 			RETURN(EX_CANTCREAT);
5525 		}
5526 
5527 		curoff = stb.st_size;
5528 
5529 		if (ev != NULL)
5530 			sm_clrevent(ev);
5531 
5532 		memset(&mcibuf, '\0', sizeof mcibuf);
5533 		mcibuf.mci_mailer = mailer;
5534 		mcibuf.mci_out = f;
5535 		if (bitnset(M_7BITS, mailer->m_flags))
5536 			mcibuf.mci_flags |= MCIF_7BIT;
5537 
5538 		/* clear out per-message flags from connection structure */
5539 		mcibuf.mci_flags &= ~(MCIF_CVT7TO8|MCIF_CVT8TO7);
5540 
5541 		if (bitset(EF_HAS8BIT, e->e_flags) &&
5542 		    !bitset(EF_DONT_MIME, e->e_flags) &&
5543 		    bitnset(M_7BITS, mailer->m_flags))
5544 			mcibuf.mci_flags |= MCIF_CVT8TO7;
5545 
5546 #if MIME7TO8
5547 		if (bitnset(M_MAKE8BIT, mailer->m_flags) &&
5548 		    !bitset(MCIF_7BIT, mcibuf.mci_flags) &&
5549 		    (p = hvalue("Content-Transfer-Encoding", e->e_header)) != NULL &&
5550 		    (sm_strcasecmp(p, "quoted-printable") == 0 ||
5551 		     sm_strcasecmp(p, "base64") == 0) &&
5552 		    (p = hvalue("Content-Type", e->e_header)) != NULL)
5553 		{
5554 			/* may want to convert 7 -> 8 */
5555 			/* XXX should really parse it here -- and use a class XXX */
5556 			if (sm_strncasecmp(p, "text/plain", 10) == 0 &&
5557 			    (p[10] == '\0' || p[10] == ' ' || p[10] == ';'))
5558 				mcibuf.mci_flags |= MCIF_CVT7TO8;
5559 		}
5560 #endif /* MIME7TO8 */
5561 
5562 		putfromline(&mcibuf, e);
5563 		(*e->e_puthdr)(&mcibuf, e->e_header, e, M87F_OUTER);
5564 		(*e->e_putbody)(&mcibuf, e, NULL);
5565 		putline("\n", &mcibuf);
5566 		if (sm_io_flush(f, SM_TIME_DEFAULT) != 0 ||
5567 		    (SuperSafe != SAFE_NO &&
5568 		     fsync(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL)) < 0) ||
5569 		    sm_io_error(f))
5570 		{
5571 			setstat(EX_IOERR);
5572 #if !NOFTRUNCATE
5573 			(void) ftruncate(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL),
5574 					 curoff);
5575 #endif /* !NOFTRUNCATE */
5576 		}
5577 
5578 		/* reset ISUID & ISGID bits for paranoid systems */
5579 #if HASFCHMOD
5580 		(void) fchmod(sm_io_getinfo(f, SM_IO_WHAT_FD, NULL),
5581 			      (MODE_T) mode);
5582 #else /* HASFCHMOD */
5583 		(void) chmod(filename, (MODE_T) mode);
5584 #endif /* HASFCHMOD */
5585 		if (sm_io_close(f, SM_TIME_DEFAULT) < 0)
5586 			setstat(EX_IOERR);
5587 		(void) sm_io_flush(smioout, SM_TIME_DEFAULT);
5588 		(void) setuid(RealUid);
5589 		exit(ExitStat);
5590 		/* NOTREACHED */
5591 	}
5592 	else
5593 	{
5594 		/* parent -- wait for exit status */
5595 		int st;
5596 
5597 		st = waitfor(pid);
5598 		if (st == -1)
5599 		{
5600 			syserr("mailfile: %s: wait", mailer->m_name);
5601 			return EX_SOFTWARE;
5602 		}
5603 		if (WIFEXITED(st))
5604 		{
5605 			errno = 0;
5606 			return (WEXITSTATUS(st));
5607 		}
5608 		else
5609 		{
5610 			syserr("mailfile: %s: child died on signal %d",
5611 			       mailer->m_name, st);
5612 			return EX_UNAVAILABLE;
5613 		}
5614 		/* NOTREACHED */
5615 	}
5616 	return EX_UNAVAILABLE;	/* avoid compiler warning on IRIX */
5617 }
5618 
5619 static void
5620 mailfiletimeout(ignore)
5621 	int ignore;
5622 {
5623 	/*
5624 	**  NOTE: THIS CAN BE CALLED FROM A SIGNAL HANDLER.  DO NOT ADD
5625 	**	ANYTHING TO THIS ROUTINE UNLESS YOU KNOW WHAT YOU ARE
5626 	**	DOING.
5627 	*/
5628 
5629 	errno = ETIMEDOUT;
5630 	longjmp(CtxMailfileTimeout, 1);
5631 }
5632 /*
5633 **  HOSTSIGNATURE -- return the "signature" for a host.
5634 **
5635 **	The signature describes how we are going to send this -- it
5636 **	can be just the hostname (for non-Internet hosts) or can be
5637 **	an ordered list of MX hosts.
5638 **
5639 **	Parameters:
5640 **		m -- the mailer describing this host.
5641 **		host -- the host name.
5642 **
5643 **	Returns:
5644 **		The signature for this host.
5645 **
5646 **	Side Effects:
5647 **		Can tweak the symbol table.
5648 */
5649 
5650 #define MAXHOSTSIGNATURE	8192	/* max len of hostsignature */
5651 
5652 char *
5653 hostsignature(m, host)
5654 	register MAILER *m;
5655 	char *host;
5656 {
5657 	register char *p;
5658 	register STAB *s;
5659 	time_t now;
5660 #if NAMED_BIND
5661 	char sep = ':';
5662 	char prevsep = ':';
5663 	int i;
5664 	int len;
5665 	int nmx;
5666 	int hl;
5667 	char *hp;
5668 	char *endp;
5669 	int oldoptions = _res.options;
5670 	char *mxhosts[MAXMXHOSTS + 1];
5671 	unsigned short mxprefs[MAXMXHOSTS + 1];
5672 #endif /* NAMED_BIND */
5673 
5674 	if (tTd(17, 3))
5675 		sm_dprintf("hostsignature(%s)\n", host);
5676 
5677 	/*
5678 	**  If local delivery (and not remote), just return a constant.
5679 	*/
5680 
5681 	if (bitnset(M_LOCALMAILER, m->m_flags) &&
5682 	    strcmp(m->m_mailer, "[IPC]") != 0 &&
5683 	    !(m->m_argv[0] != NULL && strcmp(m->m_argv[0], "TCP") == 0))
5684 		return "localhost";
5685 
5686 	/* an empty host does not have MX records */
5687 	if (*host == '\0')
5688 		return "_empty_";
5689 
5690 	/*
5691 	**  Check to see if this uses IPC -- if not, it can't have MX records.
5692 	*/
5693 
5694 	if (strcmp(m->m_mailer, "[IPC]") != 0 ||
5695 	    CurEnv->e_sendmode == SM_DEFER)
5696 	{
5697 		/* just an ordinary mailer or deferred mode */
5698 		return host;
5699 	}
5700 #if NETUNIX
5701 	else if (m->m_argv[0] != NULL &&
5702 		 strcmp(m->m_argv[0], "FILE") == 0)
5703 	{
5704 		/* rendezvous in the file system, no MX records */
5705 		return host;
5706 	}
5707 #endif /* NETUNIX */
5708 
5709 	/*
5710 	**  Look it up in the symbol table.
5711 	*/
5712 
5713 	now = curtime();
5714 	s = stab(host, ST_HOSTSIG, ST_ENTER);
5715 	if (s->s_hostsig.hs_sig != NULL)
5716 	{
5717 		if (s->s_hostsig.hs_exp >= now)
5718 		{
5719 			if (tTd(17, 3))
5720 				sm_dprintf("hostsignature(): stab(%s) found %s\n", host,
5721 					   s->s_hostsig.hs_sig);
5722 			return s->s_hostsig.hs_sig;
5723 		}
5724 
5725 		/* signature is expired: clear it */
5726 		sm_free(s->s_hostsig.hs_sig);
5727 		s->s_hostsig.hs_sig = NULL;
5728 	}
5729 
5730 	/* set default TTL */
5731 	s->s_hostsig.hs_exp = now + SM_DEFAULT_TTL;
5732 
5733 	/*
5734 	**  Not already there or expired -- create a signature.
5735 	*/
5736 
5737 #if NAMED_BIND
5738 	if (ConfigLevel < 2)
5739 		_res.options &= ~(RES_DEFNAMES | RES_DNSRCH);	/* XXX */
5740 
5741 	for (hp = host; hp != NULL; hp = endp)
5742 	{
5743 #if NETINET6
5744 		if (*hp == '[')
5745 		{
5746 			endp = strchr(hp + 1, ']');
5747 			if (endp != NULL)
5748 				endp = strpbrk(endp + 1, ":,");
5749 		}
5750 		else
5751 			endp = strpbrk(hp, ":,");
5752 #else /* NETINET6 */
5753 		endp = strpbrk(hp, ":,");
5754 #endif /* NETINET6 */
5755 		if (endp != NULL)
5756 		{
5757 			sep = *endp;
5758 			*endp = '\0';
5759 		}
5760 
5761 		if (bitnset(M_NOMX, m->m_flags))
5762 		{
5763 			/* skip MX lookups */
5764 			nmx = 1;
5765 			mxhosts[0] = hp;
5766 		}
5767 		else
5768 		{
5769 			auto int rcode;
5770 			int ttl;
5771 
5772 			nmx = getmxrr(hp, mxhosts, mxprefs, true, &rcode, true,
5773 				      &ttl);
5774 			if (nmx <= 0)
5775 			{
5776 				int save_errno;
5777 				register MCI *mci;
5778 
5779 				/* update the connection info for this host */
5780 				save_errno = errno;
5781 				mci = mci_get(hp, m);
5782 				mci->mci_errno = save_errno;
5783 				mci->mci_herrno = h_errno;
5784 				mci->mci_lastuse = now;
5785 				if (rcode == EX_NOHOST)
5786 					mci_setstat(mci, rcode, "5.1.2",
5787 						    "550 Host unknown");
5788 				else
5789 					mci_setstat(mci, rcode, NULL, NULL);
5790 
5791 				/* use the original host name as signature */
5792 				nmx = 1;
5793 				mxhosts[0] = hp;
5794 			}
5795 			if (tTd(17, 3))
5796 				sm_dprintf("hostsignature(): getmxrr() returned %d, mxhosts[0]=%s\n",
5797 					   nmx, mxhosts[0]);
5798 
5799 			/*
5800 			**  Set new TTL: we use only one!
5801 			**	We could try to use the minimum instead.
5802 			*/
5803 
5804 			s->s_hostsig.hs_exp = now + SM_MIN(ttl, SM_DEFAULT_TTL);
5805 		}
5806 
5807 		len = 0;
5808 		for (i = 0; i < nmx; i++)
5809 			len += strlen(mxhosts[i]) + 1;
5810 		if (s->s_hostsig.hs_sig != NULL)
5811 			len += strlen(s->s_hostsig.hs_sig) + 1;
5812 		if (len < 0 || len >= MAXHOSTSIGNATURE)
5813 		{
5814 			sm_syslog(LOG_WARNING, NOQID, "hostsignature for host '%s' exceeds maxlen (%d): %d",
5815 				  host, MAXHOSTSIGNATURE, len);
5816 			len = MAXHOSTSIGNATURE;
5817 		}
5818 		p = sm_pmalloc_x(len);
5819 		if (s->s_hostsig.hs_sig != NULL)
5820 		{
5821 			(void) sm_strlcpy(p, s->s_hostsig.hs_sig, len);
5822 			sm_free(s->s_hostsig.hs_sig); /* XXX */
5823 			s->s_hostsig.hs_sig = p;
5824 			hl = strlen(p);
5825 			p += hl;
5826 			*p++ = prevsep;
5827 			len -= hl + 1;
5828 		}
5829 		else
5830 			s->s_hostsig.hs_sig = p;
5831 		for (i = 0; i < nmx; i++)
5832 		{
5833 			hl = strlen(mxhosts[i]);
5834 			if (len - 1 < hl || len <= 1)
5835 			{
5836 				/* force to drop out of outer loop */
5837 				len = -1;
5838 				break;
5839 			}
5840 			if (i != 0)
5841 			{
5842 				if (mxprefs[i] == mxprefs[i - 1])
5843 					*p++ = ',';
5844 				else
5845 					*p++ = ':';
5846 				len--;
5847 			}
5848 			(void) sm_strlcpy(p, mxhosts[i], len);
5849 			p += hl;
5850 			len -= hl;
5851 		}
5852 
5853 		/*
5854 		**  break out of loop if len exceeded MAXHOSTSIGNATURE
5855 		**  because we won't have more space for further hosts
5856 		**  anyway (separated by : in the .cf file).
5857 		*/
5858 
5859 		if (len < 0)
5860 			break;
5861 		if (endp != NULL)
5862 			*endp++ = sep;
5863 		prevsep = sep;
5864 	}
5865 	makelower(s->s_hostsig.hs_sig);
5866 	if (ConfigLevel < 2)
5867 		_res.options = oldoptions;
5868 #else /* NAMED_BIND */
5869 	/* not using BIND -- the signature is just the host name */
5870 	/*
5871 	**  'host' points to storage that will be freed after we are
5872 	**  done processing the current envelope, so we copy it.
5873 	*/
5874 	s->s_hostsig.hs_sig = sm_pstrdup_x(host);
5875 #endif /* NAMED_BIND */
5876 	if (tTd(17, 1))
5877 		sm_dprintf("hostsignature(%s) = %s\n", host, s->s_hostsig.hs_sig);
5878 	return s->s_hostsig.hs_sig;
5879 }
5880 /*
5881 **  PARSE_HOSTSIGNATURE -- parse the "signature" and return MX host array.
5882 **
5883 **	The signature describes how we are going to send this -- it
5884 **	can be just the hostname (for non-Internet hosts) or can be
5885 **	an ordered list of MX hosts which must be randomized for equal
5886 **	MX preference values.
5887 **
5888 **	Parameters:
5889 **		sig -- the host signature.
5890 **		mxhosts -- array to populate.
5891 **		mailer -- mailer.
5892 **
5893 **	Returns:
5894 **		The number of hosts inserted into mxhosts array.
5895 **
5896 **	Side Effects:
5897 **		Randomizes equal MX preference hosts in mxhosts.
5898 */
5899 
5900 static int
5901 parse_hostsignature(sig, mxhosts, mailer)
5902 	char *sig;
5903 	char **mxhosts;
5904 	MAILER *mailer;
5905 {
5906 	unsigned short curpref = 0;
5907 	int nmx = 0, i, j;	/* NOTE: i, j, and nmx must have same type */
5908 	char *hp, *endp;
5909 	unsigned short prefer[MAXMXHOSTS];
5910 	long rndm[MAXMXHOSTS];
5911 
5912 	for (hp = sig; hp != NULL; hp = endp)
5913 	{
5914 		char sep = ':';
5915 
5916 #if NETINET6
5917 		if (*hp == '[')
5918 		{
5919 			endp = strchr(hp + 1, ']');
5920 			if (endp != NULL)
5921 				endp = strpbrk(endp + 1, ":,");
5922 		}
5923 		else
5924 			endp = strpbrk(hp, ":,");
5925 #else /* NETINET6 */
5926 		endp = strpbrk(hp, ":,");
5927 #endif /* NETINET6 */
5928 		if (endp != NULL)
5929 		{
5930 			sep = *endp;
5931 			*endp = '\0';
5932 		}
5933 
5934 		mxhosts[nmx] = hp;
5935 		prefer[nmx] = curpref;
5936 		if (mci_match(hp, mailer))
5937 			rndm[nmx] = 0;
5938 		else
5939 			rndm[nmx] = get_random();
5940 
5941 		if (endp != NULL)
5942 		{
5943 			/*
5944 			**  Since we don't have the original MX prefs,
5945 			**  make our own.  If the separator is a ':', that
5946 			**  means the preference for the next host will be
5947 			**  higher than this one, so simply increment curpref.
5948 			*/
5949 
5950 			if (sep == ':')
5951 				curpref++;
5952 
5953 			*endp++ = sep;
5954 		}
5955 		if (++nmx >= MAXMXHOSTS)
5956 			break;
5957 	}
5958 
5959 	/* sort the records using the random factor for equal preferences */
5960 	for (i = 0; i < nmx; i++)
5961 	{
5962 		for (j = i + 1; j < nmx; j++)
5963 		{
5964 			/*
5965 			**  List is already sorted by MX preference, only
5966 			**  need to look for equal preference MX records
5967 			*/
5968 
5969 			if (prefer[i] < prefer[j])
5970 				break;
5971 
5972 			if (prefer[i] > prefer[j] ||
5973 			    (prefer[i] == prefer[j] && rndm[i] > rndm[j]))
5974 			{
5975 				register unsigned short tempp;
5976 				register long tempr;
5977 				register char *temp1;
5978 
5979 				tempp = prefer[i];
5980 				prefer[i] = prefer[j];
5981 				prefer[j] = tempp;
5982 				temp1 = mxhosts[i];
5983 				mxhosts[i] = mxhosts[j];
5984 				mxhosts[j] = temp1;
5985 				tempr = rndm[i];
5986 				rndm[i] = rndm[j];
5987 				rndm[j] = tempr;
5988 			}
5989 		}
5990 	}
5991 	return nmx;
5992 }
5993 
5994 # if STARTTLS
5995 static SSL_CTX	*clt_ctx = NULL;
5996 static bool	tls_ok_clt = true;
5997 
5998 /*
5999 **  SETCLTTLS -- client side TLS: allow/disallow.
6000 **
6001 **	Parameters:
6002 **		tls_ok -- should tls be done?
6003 **
6004 **	Returns:
6005 **		none.
6006 **
6007 **	Side Effects:
6008 **		sets tls_ok_clt (static variable in this module)
6009 */
6010 
6011 void
6012 setclttls(tls_ok)
6013 	bool tls_ok;
6014 {
6015 	tls_ok_clt = tls_ok;
6016 	return;
6017 }
6018 /*
6019 **  INITCLTTLS -- initialize client side TLS
6020 **
6021 **	Parameters:
6022 **		tls_ok -- should tls initialization be done?
6023 **
6024 **	Returns:
6025 **		succeeded?
6026 **
6027 **	Side Effects:
6028 **		sets tls_ok_clt (static variable in this module)
6029 */
6030 
6031 bool
6032 initclttls(tls_ok)
6033 	bool tls_ok;
6034 {
6035 	if (!tls_ok_clt)
6036 		return false;
6037 	tls_ok_clt = tls_ok;
6038 	if (!tls_ok_clt)
6039 		return false;
6040 	if (clt_ctx != NULL)
6041 		return true;	/* already done */
6042 	tls_ok_clt = inittls(&clt_ctx, TLS_I_CLT, false, CltCertFile,
6043 			     CltKeyFile, CACertPath, CACertFile, DHParams);
6044 	return tls_ok_clt;
6045 }
6046 
6047 /*
6048 **  STARTTLS -- try to start secure connection (client side)
6049 **
6050 **	Parameters:
6051 **		m -- the mailer.
6052 **		mci -- the mailer connection info.
6053 **		e -- the envelope.
6054 **
6055 **	Returns:
6056 **		success?
6057 **		(maybe this should be some other code than EX_
6058 **		that denotes which stage failed.)
6059 */
6060 
6061 static int
6062 starttls(m, mci, e)
6063 	MAILER *m;
6064 	MCI *mci;
6065 	ENVELOPE *e;
6066 {
6067 	int smtpresult;
6068 	int result = 0;
6069 	int rfd, wfd;
6070 	SSL *clt_ssl = NULL;
6071 	time_t tlsstart;
6072 
6073 	if (clt_ctx == NULL && !initclttls(true))
6074 		return EX_TEMPFAIL;
6075 	smtpmessage("STARTTLS", m, mci);
6076 
6077 	/* get the reply */
6078 	smtpresult = reply(m, mci, e, TimeOuts.to_starttls, NULL, NULL,
6079 			XS_STARTTLS);
6080 
6081 	/* check return code from server */
6082 	if (smtpresult == 454)
6083 		return EX_TEMPFAIL;
6084 	if (smtpresult == 501)
6085 		return EX_USAGE;
6086 	if (smtpresult == -1)
6087 		return smtpresult;
6088 	if (smtpresult != 220)
6089 		return EX_PROTOCOL;
6090 
6091 	if (LogLevel > 13)
6092 		sm_syslog(LOG_INFO, NOQID, "STARTTLS=client, start=ok");
6093 
6094 	/* start connection */
6095 	if ((clt_ssl = SSL_new(clt_ctx)) == NULL)
6096 	{
6097 		if (LogLevel > 5)
6098 		{
6099 			sm_syslog(LOG_ERR, NOQID,
6100 				  "STARTTLS=client, error: SSL_new failed");
6101 			if (LogLevel > 9)
6102 				tlslogerr("client");
6103 		}
6104 		return EX_SOFTWARE;
6105 	}
6106 
6107 	rfd = sm_io_getinfo(mci->mci_in, SM_IO_WHAT_FD, NULL);
6108 	wfd = sm_io_getinfo(mci->mci_out, SM_IO_WHAT_FD, NULL);
6109 
6110 	/* SSL_clear(clt_ssl); ? */
6111 	if (rfd < 0 || wfd < 0 ||
6112 	    (result = SSL_set_rfd(clt_ssl, rfd)) != 1 ||
6113 	    (result = SSL_set_wfd(clt_ssl, wfd)) != 1)
6114 	{
6115 		if (LogLevel > 5)
6116 		{
6117 			sm_syslog(LOG_ERR, NOQID,
6118 				  "STARTTLS=client, error: SSL_set_xfd failed=%d",
6119 				  result);
6120 			if (LogLevel > 9)
6121 				tlslogerr("client");
6122 		}
6123 		return EX_SOFTWARE;
6124 	}
6125 	SSL_set_connect_state(clt_ssl);
6126 	tlsstart = curtime();
6127 
6128 ssl_retry:
6129 	if ((result = SSL_connect(clt_ssl)) <= 0)
6130 	{
6131 		int i;
6132 		bool timedout;
6133 		time_t left;
6134 		time_t now = curtime();
6135 		struct timeval tv;
6136 
6137 		/* what to do in this case? */
6138 		i = SSL_get_error(clt_ssl, result);
6139 
6140 		/*
6141 		**  For SSL_ERROR_WANT_{READ,WRITE}:
6142 		**  There is not a complete SSL record available yet
6143 		**  or there is only a partial SSL record removed from
6144 		**  the network (socket) buffer into the SSL buffer.
6145 		**  The SSL_connect will only succeed when a full
6146 		**  SSL record is available (assuming a "real" error
6147 		**  doesn't happen). To handle when a "real" error
6148 		**  does happen the select is set for exceptions too.
6149 		**  The connection may be re-negotiated during this time
6150 		**  so both read and write "want errors" need to be handled.
6151 		**  A select() exception loops back so that a proper SSL
6152 		**  error message can be gotten.
6153 		*/
6154 
6155 		left = TimeOuts.to_starttls - (now - tlsstart);
6156 		timedout = left <= 0;
6157 		if (!timedout)
6158 		{
6159 			tv.tv_sec = left;
6160 			tv.tv_usec = 0;
6161 		}
6162 
6163 		if (!timedout && FD_SETSIZE > 0 &&
6164 		    (rfd >= FD_SETSIZE ||
6165 		     (i == SSL_ERROR_WANT_WRITE && wfd >= FD_SETSIZE)))
6166 		{
6167 			if (LogLevel > 5)
6168 			{
6169 				sm_syslog(LOG_ERR, e->e_id,
6170 					  "STARTTLS=client, error: fd %d/%d too large",
6171 					  rfd, wfd);
6172 			if (LogLevel > 8)
6173 				tlslogerr("client");
6174 			}
6175 			errno = EINVAL;
6176 			goto tlsfail;
6177 		}
6178 		if (!timedout && i == SSL_ERROR_WANT_READ)
6179 		{
6180 			fd_set ssl_maskr, ssl_maskx;
6181 
6182 			FD_ZERO(&ssl_maskr);
6183 			FD_SET(rfd, &ssl_maskr);
6184 			FD_ZERO(&ssl_maskx);
6185 			FD_SET(rfd, &ssl_maskx);
6186 			if (select(rfd + 1, &ssl_maskr, NULL, &ssl_maskx, &tv)
6187 			    > 0)
6188 				goto ssl_retry;
6189 		}
6190 		if (!timedout && i == SSL_ERROR_WANT_WRITE)
6191 		{
6192 			fd_set ssl_maskw, ssl_maskx;
6193 
6194 			FD_ZERO(&ssl_maskw);
6195 			FD_SET(wfd, &ssl_maskw);
6196 			FD_ZERO(&ssl_maskx);
6197 			FD_SET(rfd, &ssl_maskx);
6198 			if (select(wfd + 1, NULL, &ssl_maskw, &ssl_maskx, &tv)
6199 			    > 0)
6200 				goto ssl_retry;
6201 		}
6202 		if (LogLevel > 5)
6203 		{
6204 			sm_syslog(LOG_ERR, e->e_id,
6205 				  "STARTTLS=client, error: connect failed=%d, SSL_error=%d, timedout=%d, errno=%d",
6206 				  result, i, (int) timedout, errno);
6207 			if (LogLevel > 8)
6208 				tlslogerr("client");
6209 		}
6210 tlsfail:
6211 		SSL_free(clt_ssl);
6212 		clt_ssl = NULL;
6213 		return EX_SOFTWARE;
6214 	}
6215 	mci->mci_ssl = clt_ssl;
6216 	result = tls_get_info(mci->mci_ssl, false, mci->mci_host,
6217 			      &mci->mci_macro, true);
6218 
6219 	/* switch to use TLS... */
6220 	if (sfdctls(&mci->mci_in, &mci->mci_out, mci->mci_ssl) == 0)
6221 		return EX_OK;
6222 
6223 	/* failure */
6224 	SSL_free(clt_ssl);
6225 	clt_ssl = NULL;
6226 	return EX_SOFTWARE;
6227 }
6228 /*
6229 **  ENDTLSCLT -- shutdown secure connection (client side)
6230 **
6231 **	Parameters:
6232 **		mci -- the mailer connection info.
6233 **
6234 **	Returns:
6235 **		success?
6236 */
6237 
6238 static int
6239 endtlsclt(mci)
6240 	MCI *mci;
6241 {
6242 	int r;
6243 
6244 	if (!bitset(MCIF_TLSACT, mci->mci_flags))
6245 		return EX_OK;
6246 	r = endtls(mci->mci_ssl, "client");
6247 	mci->mci_flags &= ~MCIF_TLSACT;
6248 	return r;
6249 }
6250 # endif /* STARTTLS */
6251 # if STARTTLS || SASL
6252 /*
6253 **  ISCLTFLGSET -- check whether client flag is set.
6254 **
6255 **	Parameters:
6256 **		e -- envelope.
6257 **		flag -- flag to check in {client_flags}
6258 **
6259 **	Returns:
6260 **		true iff flag is set.
6261 */
6262 
6263 static bool
6264 iscltflgset(e, flag)
6265 	ENVELOPE *e;
6266 	int flag;
6267 {
6268 	char *p;
6269 
6270 	p = macvalue(macid("{client_flags}"), e);
6271 	if (p == NULL)
6272 		return false;
6273 	for (; *p != '\0'; p++)
6274 	{
6275 		/* look for just this one flag */
6276 		if (*p == (char) flag)
6277 			return true;
6278 	}
6279 	return false;
6280 }
6281 # endif /* STARTTLS || SASL */
6282